summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/meta/WebCryptoAPI
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:22:09 +0000
commit43a97878ce14b72f0981164f87f2e35e14151312 (patch)
tree620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/meta/WebCryptoAPI
parentInitial commit. (diff)
downloadfirefox-43a97878ce14b72f0981164f87f2e35e14151312.tar.xz
firefox-43a97878ce14b72f0981164f87f2e35e14151312.zip
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini134
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini90
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini60
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini6582
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini71
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini2
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini85
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini86
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini104
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini103
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini62
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini62
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini143
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini35
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini35
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini55
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini55
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini5
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini11
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini37
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini146
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini342
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini1194
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini1194
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini1170
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini1168
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini74
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini7
55 files changed, 13579 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini
new file mode 100644
index 0000000000..5bdf5da8da
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini
@@ -0,0 +1,134 @@
+[cfrg_curves_bits.https.any.html]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 with null length]
+ expected: FAIL
+
+ [X25519 short result]
+ expected: FAIL
+
+ [X25519 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 asking for too many bits]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 with null length]
+ expected: FAIL
+
+ [X448 short result]
+ expected: FAIL
+
+ [X448 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X448 asking for too many bits]
+ expected: FAIL
+
+
+[cfrg_curves_bits.https.any.worker.html]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 with null length]
+ expected: FAIL
+
+ [X25519 short result]
+ expected: FAIL
+
+ [X25519 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 asking for too many bits]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 with null length]
+ expected: FAIL
+
+ [X448 short result]
+ expected: FAIL
+
+ [X448 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X448 asking for too many bits]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini
new file mode 100644
index 0000000000..8656ad9277
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini
@@ -0,0 +1,90 @@
+[cfrg_curves_keys.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+
+[cfrg_curves_keys.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini
new file mode 100644
index 0000000000..e6e8b4838e
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini
@@ -0,0 +1,114 @@
+[ecdh_bits.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 with null length]
+ expected: FAIL
+
+ [P-256 with null length]
+ expected: FAIL
+
+ [P-384 with null length]
+ expected: FAIL
+
+ [P-521 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-256 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-384 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+ [P-521 asking for too many bits]
+ expected: FAIL
+
+ [P-256 asking for too many bits]
+ expected: FAIL
+
+ [P-384 asking for too many bits]
+ expected: FAIL
+
+
+[ecdh_bits.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 with null length]
+ expected: FAIL
+
+ [P-256 with null length]
+ expected: FAIL
+
+ [P-384 with null length]
+ expected: FAIL
+
+ [P-521 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-256 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-384 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+ [P-521 asking for too many bits]
+ expected: FAIL
+
+ [P-256 asking for too many bits]
+ expected: FAIL
+
+ [P-384 asking for too many bits]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini
new file mode 100644
index 0000000000..77626e97ce
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini
@@ -0,0 +1,60 @@
+[ecdh_keys.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+
+[ecdh_keys.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini
new file mode 100644
index 0000000000..64ea9238c4
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini
@@ -0,0 +1,6582 @@
+[hkdf.https.any.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?3001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?3001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini
new file mode 100644
index 0000000000..0343227ec9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini
@@ -0,0 +1,71 @@
+[pbkdf2.https.any.worker.html?4001-5000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?7001-8000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?6001-7000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?5001-6000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?3001-4000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?4001-5000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?3001-4000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?6001-7000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?5001-6000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?8001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?8001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?7001-8000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini
new file mode 100644
index 0000000000..61219c670f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini
@@ -0,0 +1,7 @@
+[aes_ctr.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[aes_ctr.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini
new file mode 100644
index 0000000000..eb519b215d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini
@@ -0,0 +1,7 @@
+[aes_gcm.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[aes_gcm.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini
new file mode 100644
index 0000000000..80bb338bc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_oaep.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_oaep.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..b111d17818
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini
@@ -0,0 +1,2 @@
+[failures_AES-CBC.https.any.worker.html]
+ expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..a9cfe36431
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..c4d448df14
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..16b793476a
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..fabdc0a3eb
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..04d4f618b3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..2778d7434f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
@@ -0,0 +1,85 @@
+[failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..8941a9ed9c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
@@ -0,0 +1,86 @@
+[failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..e55b53a962
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..f982a3bf10
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSA-OAEP.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSA-OAEP.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..436da8dc0c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSA-PSS.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSA-PSS.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..b39364a70b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSASSA-PKCS1-v1_5.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..e376ff05c3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
@@ -0,0 +1,104 @@
+[failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..2b307ee49e
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
@@ -0,0 +1,103 @@
+[failures_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..91a523f00f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-CBC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-CBC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..399972f3fd
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..0fdb35351c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..813b2e309d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..4be8cda7fa
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..71add4fc60
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..ad20709733
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
@@ -0,0 +1,62 @@
+[successes_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..77b604dcd1
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
@@ -0,0 +1,62 @@
+[successes_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..255c9f33ac
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..490ddd3fec
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,143 @@
+[successes_RSA-OAEP.https.any.worker.html?111-120]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?141-150]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?151-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?51-60]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?31-40]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?61-70]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?81-90]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?71-80]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?101-110]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?41-50]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?91-100]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?131-140]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?121-130]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..3cfa96844b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
@@ -0,0 +1,35 @@
+[successes_RSA-PSS.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..ba8df85738
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,35 @@
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
new file mode 100644
index 0000000000..7659d99ecf
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
@@ -0,0 +1,55 @@
+[successes_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
new file mode 100644
index 0000000000..decd31f20a
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
@@ -0,0 +1,55 @@
+[successes_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini
new file mode 100644
index 0000000000..a1afdabc46
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini
@@ -0,0 +1,5 @@
+[getRandomValues.any.worker.html]
+
+[getRandomValues.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini
new file mode 100644
index 0000000000..2a986dea4f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini
@@ -0,0 +1,11 @@
+[historical.any.sharedworker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[historical.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[historical.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini
new file mode 100644
index 0000000000..8db67d0eb8
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini
@@ -0,0 +1,37 @@
+[idlharness.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [CryptoKey interface: existence and properties of interface object]
+ expected: FAIL
+
+ [CryptoKey interface object length]
+ expected: FAIL
+
+ [CryptoKey interface object name]
+ expected: FAIL
+
+ [CryptoKey interface: existence and properties of interface prototype object]
+ expected: FAIL
+
+ [CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
+ expected: FAIL
+
+ [CryptoKey interface: existence and properties of interface prototype object's @@unscopables property]
+ expected: FAIL
+
+ [CryptoKey interface: attribute type]
+ expected: FAIL
+
+ [CryptoKey interface: attribute extractable]
+ expected: FAIL
+
+ [CryptoKey interface: attribute algorithm]
+ expected: FAIL
+
+ [CryptoKey interface: attribute usages]
+ expected: FAIL
+
+
+[idlharness.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini
new file mode 100644
index 0000000000..b3bfbca66b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini
@@ -0,0 +1,146 @@
+[ec_importKey.https.any.html]
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+
+[ec_importKey.https.any.worker.html]
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini
new file mode 100644
index 0000000000..86e010e543
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini
@@ -0,0 +1,342 @@
+[okp_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..598d658107
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini
@@ -0,0 +1,1194 @@
+[okp_importKey_failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..b6ce289455
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini
@@ -0,0 +1,1194 @@
+[okp_importKey_failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..a33c5d83d8
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini
@@ -0,0 +1,1170 @@
+[okp_importKey_failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..d9e605511d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini
@@ -0,0 +1,1168 @@
+[okp_importKey_failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_X448.https.any.worker.html]
+ [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini
new file mode 100644
index 0000000000..adb369e47f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini
new file mode 100644
index 0000000000..adf7e4347c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini
@@ -0,0 +1,7 @@
+[symmetric_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[symmetric_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini
new file mode 100644
index 0000000000..283b12b2df
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini
@@ -0,0 +1,7 @@
+[randomUUID.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[randomUUID.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini
new file mode 100644
index 0000000000..82e2430519
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini
@@ -0,0 +1,74 @@
+[ecdsa.https.any.worker.html]
+ [ECDSA P-256 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+
+[ecdsa.https.any.html]
+ [ECDSA P-256 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini
new file mode 100644
index 0000000000..d3ad2069a9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini
@@ -0,0 +1,162 @@
+[eddsa.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [importVectorKeys step: EdDSA Ed25519 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [Sign and verify using generated Ed25519 keys.]
+ expected: FAIL
+
+ [Sign and verify using generated Ed448 keys.]
+ expected: FAIL
+
+
+[eddsa.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [importVectorKeys step: EdDSA Ed25519 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [Sign and verify using generated Ed25519 keys.]
+ expected: FAIL
+
+ [Sign and verify using generated Ed448 keys.]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini
new file mode 100644
index 0000000000..030318f47d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini
@@ -0,0 +1,7 @@
+[hmac.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[hmac.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini
new file mode 100644
index 0000000000..b4566ade12
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_pkcs.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_pkcs.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini
new file mode 100644
index 0000000000..0b8a8bc8ea
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_pss.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_pss.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini
new file mode 100644
index 0000000000..f01137ff3c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini
@@ -0,0 +1,7 @@
+[wrapKey_unwrapKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[wrapKey_unwrapKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]