summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/meta/WebCryptoAPI/generateKey
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI/generateKey')
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini2
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini85
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini86
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini104
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini103
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini62
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini62
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini143
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini35
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini35
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini55
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini55
28 files changed, 955 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..b111d17818
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini
@@ -0,0 +1,2 @@
+[failures_AES-CBC.https.any.worker.html]
+ expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..a9cfe36431
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..c4d448df14
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..16b793476a
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..fabdc0a3eb
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..04d4f618b3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..2778d7434f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
@@ -0,0 +1,85 @@
+[failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..8941a9ed9c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
@@ -0,0 +1,86 @@
+[failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..e55b53a962
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..f982a3bf10
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSA-OAEP.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSA-OAEP.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..436da8dc0c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSA-PSS.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSA-PSS.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..b39364a70b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,8 @@
+[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_RSASSA-PKCS1-v1_5.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..e376ff05c3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
@@ -0,0 +1,104 @@
+[failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..2b307ee49e
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
@@ -0,0 +1,103 @@
+[failures_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..91a523f00f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-CBC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-CBC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..399972f3fd
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..0fdb35351c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..813b2e309d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..4be8cda7fa
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..71add4fc60
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..ad20709733
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
@@ -0,0 +1,62 @@
+[successes_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..77b604dcd1
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
@@ -0,0 +1,62 @@
+[successes_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..255c9f33ac
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
@@ -0,0 +1,8 @@
+[successes_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..490ddd3fec
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,143 @@
+[successes_RSA-OAEP.https.any.worker.html?111-120]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?141-150]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?151-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?51-60]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?31-40]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?61-70]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?81-90]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?71-80]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?101-110]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?41-50]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?91-100]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?131-140]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.worker.html?121-130]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-OAEP.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..3cfa96844b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
@@ -0,0 +1,35 @@
+[successes_RSA-PSS.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSA-PSS.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..ba8df85738
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,35 @@
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
new file mode 100644
index 0000000000..7659d99ecf
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
@@ -0,0 +1,55 @@
+[successes_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
new file mode 100644
index 0000000000..decd31f20a
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
@@ -0,0 +1,55 @@
+[successes_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [ERROR, TIMEOUT]
+ ERROR
+
+[successes_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL