Test files: 54; Total subtests: 8153
| Test | Ed18 |
|---|---|
| /WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.html | OK |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| /WebCryptoAPI/generateKey/failures_ECDH.https.any.html | OK |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits, deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits, deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits, deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits, deriveKey]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify]) | FAIL |
| Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey]) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html | OK |
| aes_cbc | FAIL |
| /WebCryptoAPI/sign_verify/test_rsa_pss.https.html | OK |
| RSA-PSS with SHA-1 and no salt signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-1 and no salt verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-1, salted signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-1, salted verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-256 and no salt signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-256 and no salt verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-256, salted signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-256, salted verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-384 and no salt signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-384 and no salt verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-384, salted signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-384, salted verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-512 and no salt signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-512 and no salt verification with wrong algorithm name | FAIL |
| RSA-PSS with SHA-512, salted signing with wrong algorithm name | FAIL |
| RSA-PSS with SHA-512, salted verification with wrong algorithm name | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted round trip | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted verification | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call | FAIL |
| importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call | FAIL |
| /WebCryptoAPI/import_export/rsa_importKey.https.worker.html | OK |
| rsa_importKey | FAIL |
| /WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html | TIMEOUT |
| /WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html | TIMEOUT |
| /WebCryptoAPI/generateKey/failures_AES-GCM.https.any.html | OK |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify]) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-GCM}, false, []) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-GCM}, true, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-GCM}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-GCM}, true, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-GCM}, false, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-GCM}, true, []) | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html | OK |
| AES-GCM 128-bit key, 104-bit tag | FAIL |
| AES-GCM 128-bit key, 104-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 112-bit tag | FAIL |
| AES-GCM 128-bit key, 112-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 120-bit tag | FAIL |
| AES-GCM 128-bit key, 120-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 128-bit tag | FAIL |
| AES-GCM 128-bit key, 128-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 32-bit tag | FAIL |
| AES-GCM 128-bit key, 32-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 64-bit tag | FAIL |
| AES-GCM 128-bit key, 64-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, 96-bit tag | FAIL |
| AES-GCM 128-bit key, 96-bit tag decryption | FAIL |
| AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, 96-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, illegal tag length 129-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 129-bits decryption | FAIL |
| AES-GCM 128-bit key, illegal tag length 24-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 24-bits decryption | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 128-bit key, illegal tag length 48-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 48-bits decryption | FAIL |
| AES-GCM 128-bit key, illegal tag length 72-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 72-bits decryption | FAIL |
| AES-GCM 128-bit key, illegal tag length 95-bits | FAIL |
| AES-GCM 128-bit key, illegal tag length 95-bits decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag decryption | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 104-bit tag | FAIL |
| AES-GCM 192-bit key, 104-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 112-bit tag | FAIL |
| AES-GCM 192-bit key, 112-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 120-bit tag | FAIL |
| AES-GCM 192-bit key, 120-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 128-bit tag | FAIL |
| AES-GCM 192-bit key, 128-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 32-bit tag | FAIL |
| AES-GCM 192-bit key, 32-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 64-bit tag | FAIL |
| AES-GCM 192-bit key, 64-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, 96-bit tag | FAIL |
| AES-GCM 192-bit key, 96-bit tag decryption | FAIL |
| AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, 96-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, illegal tag length 129-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 129-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 24-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 24-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 48-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 48-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 72-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 72-bits decryption | FAIL |
| AES-GCM 192-bit key, illegal tag length 95-bits | FAIL |
| AES-GCM 192-bit key, illegal tag length 95-bits decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag decryption | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 104-bit tag | FAIL |
| AES-GCM 256-bit key, 104-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 112-bit tag | FAIL |
| AES-GCM 256-bit key, 112-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 120-bit tag | FAIL |
| AES-GCM 256-bit key, 120-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 128-bit tag | FAIL |
| AES-GCM 256-bit key, 128-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 32-bit tag | FAIL |
| AES-GCM 256-bit key, 32-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 64-bit tag | FAIL |
| AES-GCM 256-bit key, 64-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, 96-bit tag | FAIL |
| AES-GCM 256-bit key, 96-bit tag decryption | FAIL |
| AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, 96-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, illegal tag length 129-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 129-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 24-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 24-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 256-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 48-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 48-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 72-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 72-bits decryption | FAIL |
| AES-GCM 256-bit key, illegal tag length 95-bits | FAIL |
| AES-GCM 256-bit key, illegal tag length 95-bits decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag decryption | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage | FAIL |
| AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage | FAIL |
| /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10 | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.html | OK |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-CBC.https.any.html | OK |
| Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/import_export/symmetric_importKey.https.worker.html | OK |
| symmetric_importKey | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.https.html | OK |
| RSA-OAEP with SHA-512 and no label using publicKey to decrypt | FAIL |
| /WebCryptoAPI/generateKey/failures_ECDSA.https.any.html | OK |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [verify, sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, []) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign]) | FAIL |
| Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [verify, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey]) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/import_export/test_ec_importKey.https.html | OK |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, []) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, []) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, []) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, []) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign]) | FAIL |
| Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign]) | FAIL |
| Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign]) | FAIL |
| Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, []) | FAIL |
| Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, []) | FAIL |
| Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, []) | FAIL |
| Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, []) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, []) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, []) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, []) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, []) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign]) | FAIL |
| Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign]) | FAIL |
| Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign]) | FAIL |
| Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, []) | FAIL |
| Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, []) | FAIL |
| Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, []) | FAIL |
| Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, []) | FAIL |
| Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, []) | FAIL |
| /WebCryptoAPI/sign_verify/test_rsa_pkcs.https.html | OK |
| RSASSA-PKCS1-v1_5 with SHA-1 no verify usage | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 round trip | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 verification | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 no verify usage | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 round trip | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 verification | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 no verify usage | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 round trip | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 verification | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 no verify usage | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 round trip | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 verification | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call | FAIL |
| RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name | FAIL |
| /WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html | OK |
| aes_gcm | FAIL |
| /WebCryptoAPI/import_export/ec_importKey.https.worker.html | OK |
| ec_importKey | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-KW.https.any.html | OK |
| Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/secure_context/crypto-subtle-secure-context-available.https.sub.html | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/sign_verify/test_hmac.https.html | OK |
| HMAC with SHA-1 no verify usage | FAIL |
| HMAC with SHA-1 round trip | PASS |
| HMAC with SHA-1 verification | PASS |
| HMAC with SHA-1 verification failure due to short signature | PASS |
| HMAC with SHA-1 verification failure due to wrong plaintext | PASS |
| HMAC with SHA-1 verification failure due to wrong signature | PASS |
| HMAC with SHA-1 verification with altered signature after call | PASS |
| HMAC with SHA-1 with altered plaintext after call | PASS |
| HMAC with SHA-256 no verify usage | FAIL |
| HMAC with SHA-256 round trip | PASS |
| HMAC with SHA-256 verification | PASS |
| HMAC with SHA-256 verification failure due to short signature | PASS |
| HMAC with SHA-256 verification failure due to wrong plaintext | PASS |
| HMAC with SHA-256 verification failure due to wrong signature | PASS |
| HMAC with SHA-256 verification with altered signature after call | PASS |
| HMAC with SHA-256 with altered plaintext after call | PASS |
| HMAC with SHA-384 no verify usage | FAIL |
| HMAC with SHA-384 round trip | PASS |
| HMAC with SHA-384 verification | PASS |
| HMAC with SHA-384 verification failure due to short signature | PASS |
| HMAC with SHA-384 verification failure due to wrong plaintext | PASS |
| HMAC with SHA-384 verification failure due to wrong signature | PASS |
| HMAC with SHA-384 verification with altered signature after call | PASS |
| HMAC with SHA-384 with altered plaintext after call | PASS |
| HMAC with SHA-512 no verify usage | FAIL |
| HMAC with SHA-512 round trip | PASS |
| HMAC with SHA-512 verification | PASS |
| HMAC with SHA-512 verification failure due to short signature | PASS |
| HMAC with SHA-512 verification failure due to wrong plaintext | PASS |
| HMAC with SHA-512 verification failure due to wrong signature | PASS |
| HMAC with SHA-512 verification with altered signature after call | PASS |
| HMAC with SHA-512 with altered plaintext after call | PASS |
| generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name | FAIL |
| generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name | FAIL |
| /WebCryptoAPI/sign_verify/rsa_pss.https.worker.html | OK |
| rsa_pss | FAIL |
| /WebCryptoAPI/encrypt_decrypt/rsa.https.worker.html | OK |
| rsa | FAIL |
| /WebCryptoAPI/import_export/test_rsa_importKey.https.html | OK |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign]) | PASS |
| Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify]) | FAIL |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify]) | PASS |
| Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify]) | PASS |
| /WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000 | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/digest/digest.https.worker.html | OK |
| digest | FAIL |
| /WebCryptoAPI/generateKey/successes_ECDH.https.any.html | OK |
| Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits]) | FAIL |
| Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey]) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-GCM.https.any.html | OK |
| Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt]) | PASS |
| Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey]) | PASS |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/failures_AES-KW.https.any.html | OK |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify]) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-KW}, false, []) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-KW}, true, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-KW}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-KW}, true, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-KW}, false, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-KW}, true, []) | FAIL |
| /WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html | OK |
| wrapKey_unwrapKey | FAIL |
| /WebCryptoAPI/generateKey/failures_HMAC.https.any.html | OK |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey]) | FAIL |
| Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, []) | FAIL |
| /WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html | OK |
| AES-CBC 128-bit key | PASS |
| AES-CBC 128-bit key decryption | PASS |
| AES-CBC 128-bit key decryption with altered ciphertext | PASS |
| AES-CBC 128-bit key with altered plaintext | PASS |
| AES-CBC 128-bit key with mismatched key and algorithm | FAIL |
| AES-CBC 128-bit key without decrypt usage | FAIL |
| AES-CBC 128-bit key without encrypt usage | FAIL |
| AES-CBC 128-bit key, 192-bit IV | FAIL |
| AES-CBC 128-bit key, 192-bit IV decryption | FAIL |
| AES-CBC 128-bit key, 64-bit IV | FAIL |
| AES-CBC 128-bit key, 64-bit IV decryption | FAIL |
| AES-CBC 128-bit key, bigPadChar | FAIL |
| AES-CBC 128-bit key, inconsistentPadChars | FAIL |
| AES-CBC 128-bit key, zeroPadChar | FAIL |
| AES-CBC 192-bit key | PASS |
| AES-CBC 192-bit key decryption | PASS |
| AES-CBC 192-bit key decryption with altered ciphertext | PASS |
| AES-CBC 192-bit key with altered plaintext | PASS |
| AES-CBC 192-bit key with mismatched key and algorithm | FAIL |
| AES-CBC 192-bit key without decrypt usage | FAIL |
| AES-CBC 192-bit key without encrypt usage | FAIL |
| AES-CBC 192-bit key, 192-bit IV | FAIL |
| AES-CBC 192-bit key, 192-bit IV decryption | FAIL |
| AES-CBC 192-bit key, 64-bit IV | FAIL |
| AES-CBC 192-bit key, 64-bit IV decryption | FAIL |
| AES-CBC 192-bit key, bigPadChar | FAIL |
| AES-CBC 192-bit key, inconsistentPadChars | FAIL |
| AES-CBC 192-bit key, zeroPadChar | FAIL |
| AES-CBC 256-bit key | PASS |
| AES-CBC 256-bit key decryption | PASS |
| AES-CBC 256-bit key decryption with altered ciphertext | PASS |
| AES-CBC 256-bit key with altered plaintext | PASS |
| AES-CBC 256-bit key with mismatched key and algorithm | FAIL |
| AES-CBC 256-bit key without decrypt usage | FAIL |
| AES-CBC 256-bit key without encrypt usage | FAIL |
| AES-CBC 256-bit key, 192-bit IV | FAIL |
| AES-CBC 256-bit key, 192-bit IV decryption | FAIL |
| AES-CBC 256-bit key, 64-bit IV | FAIL |
| AES-CBC 256-bit key, 64-bit IV decryption | FAIL |
| AES-CBC 256-bit key, bigPadChar | FAIL |
| AES-CBC 256-bit key, inconsistentPadChars | FAIL |
| AES-CBC 256-bit key, zeroPadChar | FAIL |
| /WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html | ERROR |
| Non-secure context window does not have access to crypto.subtle | FAIL |
| Non-secure context worker does not have access to crypto.subtle | TIMEOUT |
| /WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10 | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000 | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/digest/test_digest.https.html | OK |
| AES-GCM with empty | FAIL |
| AES-GCM with long | FAIL |
| AES-GCM with medium | FAIL |
| AES-GCM with short | FAIL |
| AES-KW with empty | FAIL |
| AES-KW with long | FAIL |
| AES-KW with medium | FAIL |
| AES-KW with short | FAIL |
| PBKDF2 with empty | FAIL |
| PBKDF2 with long | FAIL |
| PBKDF2 with medium | FAIL |
| PBKDF2 with short | FAIL |
| RSA-OAEP with empty | FAIL |
| RSA-OAEP with long | FAIL |
| RSA-OAEP with medium | FAIL |
| RSA-OAEP with short | FAIL |
| SHA-1 with empty source data | FAIL |
| SHA-1 with empty source data and altered buffer after call | FAIL |
| SHA-1 with long source data | FAIL |
| SHA-1 with long source data and altered buffer after call | FAIL |
| SHA-1 with medium source data | FAIL |
| SHA-1 with medium source data and altered buffer after call | FAIL |
| SHA-1 with short source data | FAIL |
| SHA-1 with short source data and altered buffer after call | FAIL |
| SHA-256 with empty source data | FAIL |
| SHA-256 with empty source data and altered buffer after call | FAIL |
| SHA-256 with long source data | PASS |
| SHA-256 with long source data and altered buffer after call | PASS |
| SHA-256 with medium source data | PASS |
| SHA-256 with medium source data and altered buffer after call | PASS |
| SHA-256 with short source data | PASS |
| SHA-256 with short source data and altered buffer after call | PASS |
| SHA-384 with empty source data | FAIL |
| SHA-384 with empty source data and altered buffer after call | FAIL |
| SHA-384 with long source data | PASS |
| SHA-384 with long source data and altered buffer after call | PASS |
| SHA-384 with medium source data | PASS |
| SHA-384 with medium source data and altered buffer after call | PASS |
| SHA-384 with short source data | PASS |
| SHA-384 with short source data and altered buffer after call | PASS |
| SHA-512 with empty source data | FAIL |
| SHA-512 with empty source data and altered buffer after call | FAIL |
| SHA-512 with long source data | PASS |
| SHA-512 with long source data and altered buffer after call | PASS |
| SHA-512 with medium source data | PASS |
| SHA-512 with medium source data and altered buffer after call | PASS |
| SHA-512 with short source data | PASS |
| SHA-512 with short source data and altered buffer after call | PASS |
| Sha-1 with empty source data | FAIL |
| Sha-1 with long source data | FAIL |
| Sha-1 with medium source data | FAIL |
| Sha-1 with short source data | FAIL |
| Sha-256 with empty source data | FAIL |
| Sha-256 with long source data | PASS |
| Sha-256 with medium source data | PASS |
| Sha-256 with short source data | PASS |
| Sha-384 with empty source data | FAIL |
| Sha-384 with long source data | PASS |
| Sha-384 with medium source data | PASS |
| Sha-384 with short source data | PASS |
| Sha-512 with empty source data | FAIL |
| Sha-512 with long source data | PASS |
| Sha-512 with medium source data | PASS |
| Sha-512 with short source data | PASS |
| sha-1 with empty source data | FAIL |
| sha-1 with long source data | FAIL |
| sha-1 with medium source data | FAIL |
| sha-1 with short source data | FAIL |
| sha-256 with empty source data | FAIL |
| sha-256 with long source data | PASS |
| sha-256 with medium source data | PASS |
| sha-256 with short source data | PASS |
| sha-384 with empty source data | FAIL |
| sha-384 with long source data | PASS |
| sha-384 with medium source data | PASS |
| sha-384 with short source data | PASS |
| sha-512 with empty source data | FAIL |
| sha-512 with long source data | PASS |
| sha-512 with medium source data | PASS |
| sha-512 with short source data | PASS |
| /WebCryptoAPI/generateKey/successes_HMAC.https.any.html | OK |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign]) | FAIL |
| Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify]) | FAIL |
| /WebCryptoAPI/getRandomValues.any.html | OK |
| Float arrays | PASS |
| Integer array | FAIL |
| Large length | FAIL |
| Null arrays | FAIL |
| /WebCryptoAPI/import_export/test_symmetric_importKey.https.html | OK |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey]) | PASS |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits]) | FAIL |
| Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey]) | FAIL |
| /WebCryptoAPI/generateKey/successes_ECDSA.https.any.html | OK |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign]) | FAIL |
| Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign]) | FAIL |
| /WebCryptoAPI/sign_verify/ecdsa.https.worker.html | OK |
| ecdsa | FAIL |
| /WebCryptoAPI/generateKey/failures_AES-CTR.https.any.html | OK |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify]) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-CTR}, false, []) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-CTR}, true, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CTR}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CTR}, true, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-CTR}, false, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-CTR}, true, []) | FAIL |
| /WebCryptoAPI/generateKey/successes_AES-CTR.https.any.html | OK |
| Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, encrypt]) | FAIL |
| Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey]) | FAIL |
| /WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.html | OK |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, []) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify]) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| /WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html | TIMEOUT |
| /WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html | TIMEOUT |
| /WebCryptoAPI/sign_verify/hmac.https.worker.html | OK |
| hmac | FAIL |
| /WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html | OK |
| Could not run all tests | FAIL |
| /WebCryptoAPI/idlharness.https.any.html | OK |
| Crypto interface object length | PASS |
| Crypto interface object name | PASS |
| Crypto interface: attribute subtle | FAIL |
| Crypto interface: calling getRandomValues(ArrayBufferView) on crypto with too few arguments must throw TypeError | PASS |
| Crypto interface: crypto must inherit property "getRandomValues(ArrayBufferView)" with the proper type | PASS |
| Crypto interface: crypto must inherit property "subtle" with the proper type | PASS |
| Crypto interface: existence and properties of interface object | PASS |
| Crypto interface: existence and properties of interface prototype object | PASS |
| Crypto interface: existence and properties of interface prototype object's "constructor" property | PASS |
| Crypto interface: existence and properties of interface prototype object's @@unscopables property | PASS |
| Crypto interface: operation getRandomValues(ArrayBufferView) | PASS |
| Crypto must be primary interface of crypto | PASS |
| CryptoKey interface object length | PASS |
| CryptoKey interface object name | PASS |
| CryptoKey interface: attribute algorithm | FAIL |
| CryptoKey interface: attribute extractable | FAIL |
| CryptoKey interface: attribute type | FAIL |
| CryptoKey interface: attribute usages | FAIL |
| CryptoKey interface: existence and properties of interface object | PASS |
| CryptoKey interface: existence and properties of interface prototype object | PASS |
| CryptoKey interface: existence and properties of interface prototype object's "constructor" property | PASS |
| CryptoKey interface: existence and properties of interface prototype object's @@unscopables property | PASS |
| Partial interface mixin WindowOrWorkerGlobalScope: original interface mixin defined | PASS |
| Stringification of crypto | PASS |
| Stringification of crypto.subtle | PASS |
| SubtleCrypto interface object length | PASS |
| SubtleCrypto interface object name | PASS |
| SubtleCrypto interface: calling decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: calling wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object])" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "digest(AlgorithmIdentifier, BufferSource)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, [object Object])" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object])" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "sign(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object])" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)" with the proper type | PASS |
| SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type | PASS |
| SubtleCrypto interface: existence and properties of interface object | PASS |
| SubtleCrypto interface: existence and properties of interface prototype object | PASS |
| SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property | PASS |
| SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property | PASS |
| SubtleCrypto interface: operation decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) | PASS |
| SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) | PASS |
| SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object]) | PASS |
| SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource) | PASS |
| SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) | PASS |
| SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey) | PASS |
| SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object]) | PASS |
| SubtleCrypto interface: operation importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object]) | PASS |
| SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource) | PASS |
| SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object]) | PASS |
| SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) | PASS |
| SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) | PASS |
| SubtleCrypto must be primary interface of crypto.subtle | PASS |
| Window interface: attribute crypto | FAIL |
| WorkerGlobalScope interface: existence and properties of interface object | PASS |
| idl_test setup | PASS |
| /WebCryptoAPI/encrypt_decrypt/aes_ctr.https.worker.html | OK |
| aes_ctr | FAIL |
| /WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10 | TIMEOUT |
| undefined | TIMEOUT |
| /WebCryptoAPI/encrypt_decrypt/test_aes_ctr.https.html | OK |
| importKey step for decryption: AES-CTR 128-bit key | FAIL |
| importKey step for decryption: AES-CTR 128-bit key with altered ciphertext | FAIL |
| importKey step for decryption: AES-CTR 192-bit key | FAIL |
| importKey step for decryption: AES-CTR 192-bit key with altered ciphertext | FAIL |
| importKey step for decryption: AES-CTR 256-bit key | FAIL |
| importKey step for decryption: AES-CTR 256-bit key with altered ciphertext | FAIL |
| importKey step: AES-CTR 128-bit key | FAIL |
| importKey step: AES-CTR 128-bit key with altered plaintext | FAIL |
| importKey step: AES-CTR 128-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CTR 128-bit key without decrypt usage | FAIL |
| importKey step: AES-CTR 128-bit key without encrypt usage | FAIL |
| importKey step: AES-CTR 128-bit key, 0-bit counter | FAIL |
| importKey step: AES-CTR 128-bit key, 129-bit counter | FAIL |
| importKey step: AES-CTR 192-bit key | FAIL |
| importKey step: AES-CTR 192-bit key with altered plaintext | FAIL |
| importKey step: AES-CTR 192-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CTR 192-bit key without decrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key without encrypt usage | FAIL |
| importKey step: AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: AES-CTR 192-bit key, 129-bit counter | FAIL |
| importKey step: AES-CTR 256-bit key | FAIL |
| importKey step: AES-CTR 256-bit key with altered plaintext | FAIL |
| importKey step: AES-CTR 256-bit key with mismatched key and algorithm | FAIL |
| importKey step: AES-CTR 256-bit key without decrypt usage | FAIL |
| importKey step: AES-CTR 256-bit key without encrypt usage | FAIL |
| importKey step: AES-CTR 256-bit key, 0-bit counter | FAIL |
| importKey step: AES-CTR 256-bit key, 129-bit counter | FAIL |
| importKey step: decryption AES-CTR 128-bit key, 0-bit counter | FAIL |
| importKey step: decryption AES-CTR 128-bit key, 129-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 0-bit counter | FAIL |
| importKey step: decryption AES-CTR 192-bit key, 129-bit counter | FAIL |
| importKey step: decryption AES-CTR 256-bit key, 0-bit counter | FAIL |
| importKey step: decryption AES-CTR 256-bit key, 129-bit counter | FAIL |
| /WebCryptoAPI/sign_verify/rsa_pkcs.https.worker.html | OK |
| rsa_pkcs | FAIL |
| /WebCryptoAPI/generateKey/failures_AES-CBC.https.any.html | OK |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, []) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt]) | FAIL |
| Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey]) | FAIL |
| Bad algorithm: generateKey(AES, 7, []) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, 7, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, []) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, RED, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, []) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, false, [sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, []) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey(AES, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey(AES, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, []) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: AES}, true, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt]) | FAIL |
| Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign]) | FAIL |
| Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify]) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-CBC}, false, []) | FAIL |
| Empty usages: generateKey({length: 128, name: AES-CBC}, true, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CBC}, false, []) | FAIL |
| Empty usages: generateKey({length: 192, name: AES-CBC}, true, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-CBC}, false, []) | FAIL |
| Empty usages: generateKey({length: 256, name: AES-CBC}, true, []) | FAIL |
| /WebCryptoAPI/sign_verify/test_ecdsa.https.html | OK |
| importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 round trip | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 round trip | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 round trip | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 round trip | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 round trip | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 round trip | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 round trip | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 round trip | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 round trip | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name | FAIL |
| importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call | FAIL |