{
  "results": [
    {
      "test": "/WebCryptoAPI/import_export/test_ec_importKey.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/digest/test_digest.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "SHA-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with long",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-GCM 128-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/secure_context/crypto-subtle-secure-context-available.https.sub.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Secure context window has access to crypto.subtle",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Secure context worker has access to crypto.subtle",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-CBC 128-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_ECDSA.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/rsa.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSA-OAEP with SHA-1 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/import_export/test_symmetric_importKey.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Could not run all tests",
          "status": "FAIL",
          "message": "assert_unreached: A test failed to run: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/test_rsa_pkcs.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_AES-KW.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-KW}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-KW}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Could not run all tests",
          "status": "FAIL",
          "message": "assert_unreached: A test failed to run: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-GCM",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and AES-KW",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - DataError: \"Data provided to an operation does not meet requirements\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-PSS public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using spki and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap RSA-OAEP public key keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using raw and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap HMAC keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap HMAC keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap HMAC non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for extractable key threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - NotSupportedError: \"Operation is not supported\" Reached unreachable code"
        },
        {
          "name": "Can unwrap ECDSA private key non-extractable keys using jwk and RSA-OAEP",
          "status": "FAIL",
          "message": "assert_equals: Unwrapping a non-extractable JWK as extractable fails with DataError expected \"DataError\" but got \"Error\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-CTR 128-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_ECDSA.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign, verify, sign, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_ECDH.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-CTR 128-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 0-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 129-bit counter",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 128-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 192-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 0-bit counter decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CTR 256-bit key, 129-bit counter decryption",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_HMAC.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_ECDH.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-GCM 128-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 24-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 48-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 72-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 95-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 129-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 256-bits",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 128-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 192-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 24-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 48-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 72-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 95-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 129-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        },
        {
          "name": "AES-GCM 256-bit key, illegal tag length 256-bits decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "AES-CBC 128-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key without encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key with mismatched key and algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key without decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 64-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 192-bit IV",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 192-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 64-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 256-bit key, 192-bit IV decryption",
          "status": "FAIL",
          "message": "assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "AES-CBC 128-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 128-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 192-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, zeroPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, bigPadChar",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-CBC 256-bit key, inconsistentPadChars",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "status": "TIMEOUT",
          "xstatus": "SERVERTIMEOUT"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_AES-KW.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-GCM}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-GCM}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/import_export/symmetric_importKey.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/import_export/rsa_importKey.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/test_hmac.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "HMAC with SHA-1 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"UnknownError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"DataError\""
        }
      ]
    },
    {
      "test": "WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "status": "TIMEOUT",
          "xstatus": "SERVERTIMEOUT"
        }
      ]
    },
    {
      "test": "WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "status": "TIMEOUT",
          "xstatus": "SERVERTIMEOUT"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Non-secure context window does not have access to crypto.subtle",
          "status": "FAIL",
          "message": "assert_true: expected true got false"
        },
        {
          "name": "Non-secure context worker does not have access to crypto.subtle",
          "status": "FAIL",
          "message": "assert_equals: expected false but got true"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html",
      "status": "TIMEOUT",
      "message": null,
      "subtests": []
    },
    {
      "test": "/WebCryptoAPI/digest/digest.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "SHA-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with empty source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with empty source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with short source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with short source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with medium source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with medium source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-1 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-1 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-256 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-256 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-384 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-384 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "sha-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Sha-512 with long source data",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SHA-512 with long source data and altered buffer after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with empty",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with short",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with medium",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-GCM with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "PBKDF2 with long",
          "status": "PASS",
          "message": null
        },
        {
          "name": "AES-KW with long",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-CBC}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-CBC}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSA-OAEP with SHA-1 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label decryption",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label using publicKey to decrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label no decrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label too long plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and no label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and empty label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-256 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-1 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-512 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-OAEP with SHA-384 and a label no encrypt usage",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/test_rsa_pss.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSA-PSS with SHA-1 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/successes_HMAC.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/idlharness.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "idl_test setup",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Partial interface mixin WindowOrWorkerGlobalScope: original interface mixin defined",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: existence and properties of interface object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface object length",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface object name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: existence and properties of interface prototype object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: existence and properties of interface prototype object's \"constructor\" property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: existence and properties of interface prototype object's @@unscopables property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: attribute subtle",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: operation getRandomValues(ArrayBufferView)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto must be primary interface of crypto",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Stringification of crypto",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: crypto must inherit property \"subtle\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: crypto must inherit property \"getRandomValues(ArrayBufferView)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Crypto interface: calling getRandomValues(ArrayBufferView) on crypto with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: existence and properties of interface object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface object length",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface object name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: existence and properties of interface prototype object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: existence and properties of interface prototype object's \"constructor\" property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: existence and properties of interface prototype object's @@unscopables property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: attribute type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: attribute extractable",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: attribute algorithm",
          "status": "PASS",
          "message": null
        },
        {
          "name": "CryptoKey interface: attribute usages",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: existence and properties of interface object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface object length",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface object name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: existence and properties of interface prototype object",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: existence and properties of interface prototype object's \"constructor\" property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto must be primary interface of crypto.subtle",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Stringification of crypto.subtle",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"sign(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"digest(AlgorithmIdentifier, BufferSource)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"generateKey(AlgorithmIdentifier, boolean, [object Object])\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object])\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object])\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"exportKey(KeyFormat, CryptoKey)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object])\" with the proper type",
          "status": "PASS",
          "message": null
        },
        {
          "name": "SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Window interface: attribute crypto",
          "status": "PASS",
          "message": null
        },
        {
          "name": "WorkerGlobalScope interface: existence and properties of interface object",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/ecdsa.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 round trip",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        }
      ]
    },
    {
      "test": "WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "status": "TIMEOUT",
          "xstatus": "SERVERTIMEOUT"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html",
      "status": "TIMEOUT",
      "message": null,
      "subtests": []
    },
    {
      "test": "WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10",
      "status": "TIMEOUT",
      "message": null,
      "subtests": [
        {
          "status": "TIMEOUT",
          "xstatus": "SERVERTIMEOUT"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/test_ecdsa.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-1 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-256 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-384 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-256 with SHA-512 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-512. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-1 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-256 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-256. Message: ''Operation is not supported'' Reached unreachable code"
        },
        {
          "name": "importVectorKeys step: ECDSA P-384 with SHA-384 verification",
          "status": "FAIL",
          "message": "assert_unreached: importVectorKeys failed for ECDSA P-384 with SHA-384. Message: ''Operation is not supported'' Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/rsa_pss.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSA-PSS with SHA-1 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-1, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-256, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-384, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSA-PSS with SHA-512, salted verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/import_export/ec_importKey.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])",
          "status": "FAIL",
          "message": "assert_true: Round trip works expected true got false"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Threw an unexpected error: NotSupportedError: Operation is not supported Reached unreachable code"
        },
        {
          "name": "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/hmac.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "HMAC with SHA-1 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to wrong plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to wrong signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verification failure due to short signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-1 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-512 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-256 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "HMAC with SHA-384 verifying with wrong algorithm name",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/getRandomValues.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Float arrays",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Integer array",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Large length",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Null arrays",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/import_export/test_rsa_importKey.https.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        },
        {
          "name": "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])",
          "status": "PASS",
          "message": null
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\""
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",
          "status": "FAIL",
          "message": "assert_equals: Bad algorithm property not supported expected \"OperationError\" but got \"DataError\""
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 128, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 192, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-CTR}, false, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        },
        {
          "name": "Empty usages: generateKey({length: 256, name: AES-CTR}, true, [])",
          "status": "FAIL",
          "message": "assert_unreached: Operation succeeded, but should not have Reached unreachable code"
        }
      ]
    },
    {
      "test": "/WebCryptoAPI/sign_verify/rsa_pkcs.https.worker.html",
      "status": "OK",
      "message": null,
      "subtests": [
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 round trip",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        },
        {
          "name": "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext",
          "status": "PASS",
          "message": null
        }
      ]
    }
  ]
}