{
  "ua": [
    "Sf12"
  ],
  "results": {
    "/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt, encrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt, encrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, encrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, encrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, encrypt])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, encrypt])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/ecdsa.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "ECDSA P-256 with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification": {
          "stNum": 8,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification": {
          "stNum": 9,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification": {
          "stNum": 10,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification": {
          "stNum": 11,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification with altered signature after call": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification with altered signature after call": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification with altered signature after call": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification with altered signature after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification with altered signature after call": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification with altered signature after call": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification with altered signature after call": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification with altered signature after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call": {
          "stNum": 20,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call": {
          "stNum": 21,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call": {
          "stNum": 22,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 with altered plaintext after call": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 with altered plaintext after call": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 with altered plaintext after call": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 with altered plaintext after call": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 with altered plaintext after call": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 with altered plaintext after call": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 with altered plaintext after call": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 with altered plaintext after call": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call": {
          "stNum": 32,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call": {
          "stNum": 33,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call": {
          "stNum": 34,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call": {
          "stNum": 35,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 using privateKey to verify": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 using privateKey to verify": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 using privateKey to verify": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 using privateKey to verify": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 using privateKey to verify": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 using privateKey to verify": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 using privateKey to verify": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 using privateKey to verify": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify": {
          "stNum": 44,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify": {
          "stNum": 45,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify": {
          "stNum": 46,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify": {
          "stNum": 47,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 using publicKey to sign": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 using publicKey to sign": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 using publicKey to sign": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 using publicKey to sign": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 using publicKey to sign": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 using publicKey to sign": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 using publicKey to sign": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 using publicKey to sign": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign": {
          "stNum": 56,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign": {
          "stNum": 58,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign": {
          "stNum": 59,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 no verify usage": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 no verify usage": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 no verify usage": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 no verify usage": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 no verify usage": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 no verify usage": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 no verify usage": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 no verify usage": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage": {
          "stNum": 68,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage": {
          "stNum": 69,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage": {
          "stNum": 70,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage": {
          "stNum": 71,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 round trip": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 round trip": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 round trip": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 round trip": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 round trip": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 round trip": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 round trip": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 round trip": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 round trip": {
          "stNum": 80,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 round trip": {
          "stNum": 81,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 round trip": {
          "stNum": 82,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 round trip": {
          "stNum": 83,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 signing with wrong algorithm name": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 signing with wrong algorithm name": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 signing with wrong algorithm name": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 signing with wrong algorithm name": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 signing with wrong algorithm name": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 signing with wrong algorithm name": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 signing with wrong algorithm name": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 signing with wrong algorithm name": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to altered signature": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to altered signature": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to altered signature": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to altered signature": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to altered signature": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to altered signature": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to altered signature": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to altered signature": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature": {
          "stNum": 108,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature": {
          "stNum": 109,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature": {
          "stNum": 110,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature": {
          "stNum": 111,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to wrong hash": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to wrong hash": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to wrong hash": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to wrong hash": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to wrong hash": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to wrong hash": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to wrong hash": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to wrong hash": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash": {
          "stNum": 120,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash": {
          "stNum": 121,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash": {
          "stNum": 122,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash": {
          "stNum": 123,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to bad hash name": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to bad hash name": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to bad hash name": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to bad hash name": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to bad hash name": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to bad hash name": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to bad hash name": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to bad hash name": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name": {
          "stNum": 132,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name": {
          "stNum": 133,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name": {
          "stNum": 134,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name": {
          "stNum": 135,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to shortened signature": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to shortened signature": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to shortened signature": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to shortened signature": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to shortened signature": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to shortened signature": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to shortened signature": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to shortened signature": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature": {
          "stNum": 144,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature": {
          "stNum": 145,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature": {
          "stNum": 146,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature": {
          "stNum": 147,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 156,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 157,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 158,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 159,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name": {
          "stNum": 160,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name": {
          "stNum": 161,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name": {
          "stNum": 162,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name": {
          "stNum": 163,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 164,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 165,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 166,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 167,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/rsa.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSA-OAEP with SHA-1 and no label decryption": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label decryption": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label decryption": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label decryption": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label decryption": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label decryption": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label decryption": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label decryption": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label decryption": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label decryption with altered ciphertext": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label decryption with altered ciphertext": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label decryption with altered ciphertext": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label decryption with altered ciphertext": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label decryption with altered ciphertext": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label decryption with altered ciphertext": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label decryption with altered ciphertext": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label decryption with altered ciphertext": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label using publicKey to decrypt": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label using publicKey to decrypt": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label using publicKey to decrypt": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label using publicKey to decrypt": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label using publicKey to decrypt": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label using publicKey to decrypt": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label using publicKey to decrypt": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label using publicKey to decrypt": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label using publicKey to decrypt": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label using publicKey to decrypt": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label using publicKey to decrypt": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label using publicKey to decrypt": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label no decrypt usage": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label no decrypt usage": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label no decrypt usage": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label no decrypt usage": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label no decrypt usage": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label no decrypt usage": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label no decrypt usage": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label no decrypt usage": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label no decrypt usage": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label no decrypt usage": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label no decrypt usage": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label no decrypt usage": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label with altered plaintext": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label with altered plaintext": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label with altered plaintext": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label with altered plaintext": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label with altered plaintext": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label with altered plaintext": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label with altered plaintext": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label with altered plaintext": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label with altered plaintext": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label with altered plaintext": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label with altered plaintext": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label with altered plaintext": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label too long plaintext": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label too long plaintext": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label too long plaintext": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label too long plaintext": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label too long plaintext": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label too long plaintext": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label too long plaintext": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label too long plaintext": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label too long plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label too long plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label too long plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label too long plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label using privateKey to encrypt": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label using privateKey to encrypt": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label using privateKey to encrypt": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label using privateKey to encrypt": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label using privateKey to encrypt": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label using privateKey to encrypt": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label using privateKey to encrypt": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label using privateKey to encrypt": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label using privateKey to encrypt": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label using privateKey to encrypt": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label using privateKey to encrypt": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label using privateKey to encrypt": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label no encrypt usage": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label no encrypt usage": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label no encrypt usage": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label no encrypt usage": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label no encrypt usage": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label no encrypt usage": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label no encrypt usage": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label no encrypt usage": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label no encrypt usage": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label no encrypt usage": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label no encrypt usage": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label no encrypt usage": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Can wrap and unwrap ECDSA public key keys using spki and AES-CTR": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-CTR": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-CTR": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-CTR": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-CTR": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-CTR": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-CTR": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-CTR": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-CTR": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CTR": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-CTR": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CTR": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-CTR": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-CTR": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-CTR": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-CTR": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-CTR": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CTR": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-CTR": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CTR": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-CTR": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CTR": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CTR": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CTR": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR": {
          "stNum": 43,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CTR": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CTR": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CTR": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR": {
          "stNum": 50,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CTR": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CTR": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CTR": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and AES-CBC": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-CBC": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-CBC": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-CBC": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-CBC": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-CBC": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-CBC": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-CBC": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CBC": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-CBC": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CBC": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-CBC": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CBC": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-CBC": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-CBC": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-CBC": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-CBC": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-CBC": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CBC": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-CBC": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CBC": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-CBC": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CBC": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CBC": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CBC": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC": {
          "stNum": 103,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CBC": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CBC": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CBC": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC": {
          "stNum": 110,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CBC": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CBC": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CBC": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC": {
          "stNum": 117,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and AES-GCM": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-GCM": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-GCM": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-GCM": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-GCM": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-GCM": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-GCM": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-GCM": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-GCM": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-GCM": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-GCM": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-GCM": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-GCM": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-GCM": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-GCM": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-GCM": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-GCM": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-GCM": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-GCM": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-GCM": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-GCM": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-GCM": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-GCM": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-GCM": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-GCM": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-GCM": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-GCM": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-GCM": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-GCM": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-GCM": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM": {
          "stNum": 163,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-GCM": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-GCM": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-GCM": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM": {
          "stNum": 170,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-GCM": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-GCM": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-GCM": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM": {
          "stNum": 177,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-KW": {
          "stNum": 180,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-KW": {
          "stNum": 181,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 182,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-KW": {
          "stNum": 184,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-KW": {
          "stNum": 185,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 186,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-KW": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-KW": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-KW": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-KW": {
          "stNum": 190,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW": {
          "stNum": 191,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-KW": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-KW": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-KW": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-KW": {
          "stNum": 195,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW": {
          "stNum": 196,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-KW": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-KW": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-KW": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-KW": {
          "stNum": 200,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW": {
          "stNum": 201,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-KW": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-KW": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-KW": {
          "stNum": 205,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW": {
          "stNum": 206,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-KW": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-KW": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-KW": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-KW": {
          "stNum": 210,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW": {
          "stNum": 211,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-KW": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-KW": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW": {
          "stNum": 214,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 215,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-KW": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-KW": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW": {
          "stNum": 218,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 219,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-KW": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-KW": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW": {
          "stNum": 222,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 223,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-KW": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and RSA-OAEP": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and RSA-OAEP": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and RSA-OAEP": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and RSA-OAEP": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and RSA-OAEP": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and RSA-OAEP": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and RSA-OAEP": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and RSA-OAEP": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and RSA-OAEP": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and RSA-OAEP": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and RSA-OAEP": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.html?1-10": {
      "byUA": {
        "Sf12": "TIMEOUT"
      },
      "UAmessage": {},
      "totals": {
        "TIMEOUT": 1
      },
      "subtests": {
        "undefined": {
          "stNum": 0,
          "byUA": {
            "Sf12": "TIMEOUT"
          },
          "UAmessage": {},
          "totals": {
            "TIMEOUT": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/test_rsa_pss.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSA-PSS with SHA-1 and no salt verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification with altered signature after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification with altered signature after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification with altered signature after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification with altered signature after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification with altered signature after call": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification with altered signature after call": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification with altered signature after call": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification with altered signature after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt with altered plaintext after call": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt with altered plaintext after call": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt with altered plaintext after call": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt with altered plaintext after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted with altered plaintext after call": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted with altered plaintext after call": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted with altered plaintext after call": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted with altered plaintext after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt using privateKey to verify": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt using privateKey to verify": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt using privateKey to verify": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt using privateKey to verify": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted using privateKey to verify": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted using privateKey to verify": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted using privateKey to verify": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted using privateKey to verify": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt using publicKey to sign": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt using publicKey to sign": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt using publicKey to sign": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt using publicKey to sign": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted using publicKey to sign": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted using publicKey to sign": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted using publicKey to sign": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted using publicKey to sign": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt no verify usage": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt no verify usage": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt no verify usage": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt no verify usage": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted no verify usage": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted no verify usage": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted no verify usage": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted no verify usage": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt round trip": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt round trip": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt round trip": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt round trip": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted round trip": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted round trip": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted round trip": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted round trip": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt signing with wrong algorithm name": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt signing with wrong algorithm name": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt signing with wrong algorithm name": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt signing with wrong algorithm name": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted signing with wrong algorithm name": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted signing with wrong algorithm name": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted signing with wrong algorithm name": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted signing with wrong algorithm name": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification with wrong algorithm name": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification with wrong algorithm name": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification with wrong algorithm name": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification with wrong algorithm name": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification with wrong algorithm name": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification with wrong algorithm name": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification with wrong algorithm name": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification with wrong algorithm name": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification failure with altered signature": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification failure with altered signature": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification failure with altered signature": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification failure with altered signature": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification failure with altered signature": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification failure with altered signature": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification failure with altered signature": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification failure with altered signature": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification failure with altered plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification failure with altered plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification failure with altered plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification failure with altered plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification failure with altered plaintext": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification failure with altered plaintext": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification failure with altered plaintext": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification failure with altered plaintext": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/secure_context/crypto-subtle-secure-context-available.https.sub.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Secure context window has access to crypto.subtle": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Secure context worker has access to crypto.subtle": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/test_rsa_pkcs.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSASSA-PKCS1-v1_5 with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 no verify usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 no verify usage": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 no verify usage": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 no verify usage": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 round trip": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 round trip": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 round trip": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 round trip": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/derive_bits_keys/hkdf.https.any.html?1-1000": {
      "byUA": {
        "Sf12": "TIMEOUT"
      },
      "UAmessage": {},
      "totals": {
        "TIMEOUT": 1
      },
      "subtests": {
        "undefined": {
          "stNum": 0,
          "byUA": {
            "Sf12": "TIMEOUT"
          },
          "UAmessage": {},
          "totals": {
            "TIMEOUT": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.html?1-10": {
      "byUA": {
        "Sf12": "TIMEOUT"
      },
      "UAmessage": {},
      "totals": {
        "TIMEOUT": 1
      },
      "subtests": {
        "undefined": {
          "stNum": 0,
          "byUA": {
            "Sf12": "TIMEOUT"
          },
          "UAmessage": {},
          "totals": {
            "TIMEOUT": 1
          }
        }
      }
    },
    "/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "WebCryptoAPI: deriveKey() Using ECDH": {
          "stNum": 0,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "Data provided to an operation does not meet requirements"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_AES-KW.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-KW}, false, [])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-KW}, true, [])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-KW}, false, [])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-KW}, true, [])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-KW}, false, [])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-KW}, true, [])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/secure_context/crypto-subtle-non-secure-context-not-available.sub.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Non-secure context window does not have access to crypto.subtle": {
          "stNum": 0,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Non-secure context worker does not have access to crypto.subtle": {
          "stNum": 1,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: expected false but got true"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_HMAC.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/digest/digest.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "SHA-1 with empty source data": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with empty source data": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with empty source data": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with empty source data and altered buffer after call": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with empty source data": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with empty source data": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with empty source data": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with empty source data and altered buffer after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with empty source data": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with empty source data": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with empty source data": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with empty source data and altered buffer after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with empty source data": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with empty source data": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with empty source data": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with empty source data and altered buffer after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with short source data": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with short source data": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with short source data": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with short source data and altered buffer after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with short source data": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with short source data": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with short source data": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with short source data and altered buffer after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with short source data": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with short source data": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with short source data": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with short source data and altered buffer after call": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with short source data": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with short source data": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with short source data": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with short source data and altered buffer after call": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with medium source data": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with medium source data": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with medium source data": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with medium source data and altered buffer after call": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with medium source data": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with medium source data": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with medium source data": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with medium source data and altered buffer after call": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with medium source data": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with medium source data": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with medium source data": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with medium source data and altered buffer after call": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with medium source data": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with medium source data": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with medium source data": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with medium source data and altered buffer after call": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with long source data": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with long source data": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with long source data": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with long source data and altered buffer after call": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with long source data": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with long source data": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with long source data": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with long source data and altered buffer after call": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with long source data": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with long source data": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with long source data": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with long source data and altered buffer after call": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with long source data": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with long source data": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with long source data": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with long source data and altered buffer after call": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with empty": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with empty": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with empty": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with empty": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with short": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with short": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with short": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with short": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with medium": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with medium": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with medium": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with medium": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with long": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with long": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with long": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with long": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/symmetric_importKey.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-GCM 128-bit key, 32-bit tag": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag with altered plaintext": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag with altered plaintext": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag with altered plaintext": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag with altered plaintext": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag with altered plaintext": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag with altered plaintext": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag with altered plaintext": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag with altered plaintext": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag with altered plaintext": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag with altered plaintext": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag with altered plaintext": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag with altered plaintext": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag with altered plaintext": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag with altered plaintext": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag with altered plaintext": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag with altered plaintext": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag with altered plaintext": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag with altered plaintext": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag with altered plaintext": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag with altered plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag with altered plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag decryption": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag decryption": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag decryption": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag decryption": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag decryption": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag decryption": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag decryption": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag decryption": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag decryption": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag decryption": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag decryption": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag decryption": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag decryption": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag decryption": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag decryption": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag decryption": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag decryption": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag decryption": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag decryption": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag decryption": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag decryption": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag without encrypt usage": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag without encrypt usage": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag without encrypt usage": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag without encrypt usage": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag without encrypt usage": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag without encrypt usage": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag without encrypt usage": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag without encrypt usage": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag without encrypt usage": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag without encrypt usage": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag without encrypt usage": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag without encrypt usage": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag without encrypt usage": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag without encrypt usage": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag without encrypt usage": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag without encrypt usage": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag without encrypt usage": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag without encrypt usage": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag without encrypt usage": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag without encrypt usage": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag without encrypt usage": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag without decrypt usage": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag without decrypt usage": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag without decrypt usage": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag without decrypt usage": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag without decrypt usage": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag without decrypt usage": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag without decrypt usage": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag without decrypt usage": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag without decrypt usage": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag without decrypt usage": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag without decrypt usage": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag without decrypt usage": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag without decrypt usage": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag without decrypt usage": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag without decrypt usage": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag without decrypt usage": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag without decrypt usage": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag without decrypt usage": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag without decrypt usage": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag without decrypt usage": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag without decrypt usage": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 24-bits": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 48-bits": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 72-bits": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 95-bits": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 129-bits": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 256-bits": {
          "stNum": 299,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 24-bits": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 48-bits": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 72-bits": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 95-bits": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 129-bits": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 256-bits": {
          "stNum": 305,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 24-bits": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 48-bits": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 72-bits": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 95-bits": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 129-bits": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 256-bits": {
          "stNum": 311,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 24-bits decryption": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 48-bits decryption": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 72-bits decryption": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 95-bits decryption": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 129-bits decryption": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 256-bits decryption": {
          "stNum": 317,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 24-bits decryption": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 48-bits decryption": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 72-bits decryption": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 95-bits decryption": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 129-bits decryption": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 256-bits decryption": {
          "stNum": 323,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 24-bits decryption": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 48-bits decryption": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 72-bits decryption": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 95-bits decryption": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 129-bits decryption": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 256-bits decryption": {
          "stNum": 329,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/rsa_pkcs.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSASSA-PKCS1-v1_5 with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 no verify usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 no verify usage": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 no verify usage": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 no verify usage": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 round trip": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 round trip": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 round trip": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 round trip": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_AES-KW.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 480,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 481,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt])": {
          "stNum": 482,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt])": {
          "stNum": 483,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey])": {
          "stNum": 484,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey])": {
          "stNum": 485,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey])": {
          "stNum": 486,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey])": {
          "stNum": 487,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [])": {
          "stNum": 488,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [])": {
          "stNum": 489,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 490,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 491,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 492,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 493,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 494,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 495,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/test_hmac.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "HMAC with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification with altered signature after call": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification with altered signature after call": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification with altered signature after call": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification with altered signature after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 with altered plaintext after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 with altered plaintext after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 with altered plaintext after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 with altered plaintext after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 no verify usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 no verify usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 no verify usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 no verify usage": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 round trip": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 round trip": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 round trip": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 round trip": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 signing with wrong algorithm name": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 signing with wrong algorithm name": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 signing with wrong algorithm name": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 signing with wrong algorithm name": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verifying with wrong algorithm name": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verifying with wrong algorithm name": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verifying with wrong algorithm name": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verifying with wrong algorithm name": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to wrong plaintext": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to wrong plaintext": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to wrong plaintext": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to wrong plaintext": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to wrong signature": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to wrong signature": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to wrong signature": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to wrong signature": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to short signature": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to short signature": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to short signature": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to short signature": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/ec_importKey.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_HMAC.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 480,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 481,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 482,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify])": {
          "stNum": 483,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 484,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 485,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify])": {
          "stNum": 486,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify])": {
          "stNum": 487,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 488,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 489,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify])": {
          "stNum": 490,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 491,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify])": {
          "stNum": 492,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 493,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey])": {
          "stNum": 494,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey])": {
          "stNum": 495,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 496,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 497,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 498,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 499,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 500,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 501,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 502,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey])": {
          "stNum": 503,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 504,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 505,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 506,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey])": {
          "stNum": 507,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 508,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey])": {
          "stNum": 509,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 510,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits])": {
          "stNum": 511,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits])": {
          "stNum": 512,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 513,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 514,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 515,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 516,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 517,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 518,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 519,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits])": {
          "stNum": 520,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 521,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 522,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 523,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits])": {
          "stNum": 524,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 525,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits])": {
          "stNum": 526,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 527,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt])": {
          "stNum": 528,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt])": {
          "stNum": 529,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 530,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 531,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 532,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 533,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 534,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 535,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 536,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 537,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 538,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 539,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 540,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 541,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 542,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 543,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt])": {
          "stNum": 544,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt])": {
          "stNum": 545,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 546,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 547,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 548,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 549,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 550,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 551,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 552,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 553,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 554,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 555,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 556,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 557,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [])": {
          "stNum": 558,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [])": {
          "stNum": 559,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 560,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 561,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt])": {
          "stNum": 562,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt])": {
          "stNum": 563,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 564,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 565,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 566,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 567,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 568,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 569,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 570,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 571,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 572,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 573,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 574,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 575,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 576,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 577,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt])": {
          "stNum": 578,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt])": {
          "stNum": 579,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 580,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 581,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 582,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 583,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 584,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 585,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 586,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 587,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 588,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 589,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 590,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 591,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [])": {
          "stNum": 592,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [])": {
          "stNum": 593,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 594,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 595,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt])": {
          "stNum": 596,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt])": {
          "stNum": 597,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 598,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 599,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 600,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 601,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 602,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 603,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 604,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 605,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 606,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 607,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 608,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 609,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 610,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 611,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt])": {
          "stNum": 612,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt])": {
          "stNum": 613,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 614,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 615,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 616,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 617,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 618,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 619,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 620,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 621,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 622,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 623,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 624,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 625,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [])": {
          "stNum": 626,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [])": {
          "stNum": 627,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 628,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 629,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt])": {
          "stNum": 630,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt])": {
          "stNum": 631,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 632,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 633,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 634,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 635,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 636,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 637,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 638,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 639,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 640,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 641,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 642,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 643,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 644,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 645,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt])": {
          "stNum": 646,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt])": {
          "stNum": 647,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 648,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 649,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 650,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 651,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 652,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 653,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 654,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 655,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 656,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 657,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 658,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 659,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [])": {
          "stNum": 660,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [])": {
          "stNum": 661,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 662,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 663,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt])": {
          "stNum": 664,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt])": {
          "stNum": 665,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 666,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 667,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 668,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 669,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 670,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 671,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 672,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 673,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 674,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 675,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 676,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 677,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 678,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 679,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt])": {
          "stNum": 680,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt])": {
          "stNum": 681,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 682,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 683,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 684,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 685,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 686,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 687,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 688,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 689,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 690,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 691,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 692,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 693,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [])": {
          "stNum": 694,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [])": {
          "stNum": 695,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 696,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 697,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt])": {
          "stNum": 698,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt])": {
          "stNum": 699,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 700,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 701,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 702,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 703,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 704,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 705,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 706,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 707,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt])": {
          "stNum": 708,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt])": {
          "stNum": 709,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 710,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 711,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt])": {
          "stNum": 712,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt])": {
          "stNum": 713,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt])": {
          "stNum": 714,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt])": {
          "stNum": 715,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt])": {
          "stNum": 716,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt])": {
          "stNum": 717,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 718,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 719,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt])": {
          "stNum": 720,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt])": {
          "stNum": 721,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey])": {
          "stNum": 722,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey])": {
          "stNum": 723,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey])": {
          "stNum": 724,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey])": {
          "stNum": 725,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey])": {
          "stNum": 726,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey])": {
          "stNum": 727,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [])": {
          "stNum": 728,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [])": {
          "stNum": 729,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 730,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 731,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-CTR}, false, [])": {
          "stNum": 732,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-CTR}, true, [])": {
          "stNum": 733,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-CTR}, false, [])": {
          "stNum": 734,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-CTR}, true, [])": {
          "stNum": 735,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-CTR}, false, [])": {
          "stNum": 736,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-CTR}, true, [])": {
          "stNum": 737,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/test_ecdsa.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "ECDSA P-256 with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification": {
          "stNum": 8,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification": {
          "stNum": 9,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification": {
          "stNum": 10,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification": {
          "stNum": 11,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification with altered signature after call": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification with altered signature after call": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification with altered signature after call": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification with altered signature after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification with altered signature after call": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification with altered signature after call": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification with altered signature after call": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification with altered signature after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call": {
          "stNum": 20,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call": {
          "stNum": 21,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call": {
          "stNum": 22,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 with altered plaintext after call": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 with altered plaintext after call": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 with altered plaintext after call": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 with altered plaintext after call": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 with altered plaintext after call": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 with altered plaintext after call": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 with altered plaintext after call": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 with altered plaintext after call": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call": {
          "stNum": 32,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call": {
          "stNum": 33,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call": {
          "stNum": 34,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call": {
          "stNum": 35,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 using privateKey to verify": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 using privateKey to verify": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 using privateKey to verify": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 using privateKey to verify": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 using privateKey to verify": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 using privateKey to verify": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 using privateKey to verify": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 using privateKey to verify": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify": {
          "stNum": 44,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify": {
          "stNum": 45,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify": {
          "stNum": 46,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify": {
          "stNum": 47,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 using publicKey to sign": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 using publicKey to sign": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 using publicKey to sign": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 using publicKey to sign": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 using publicKey to sign": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 using publicKey to sign": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 using publicKey to sign": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 using publicKey to sign": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign": {
          "stNum": 56,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign": {
          "stNum": 58,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign": {
          "stNum": 59,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 no verify usage": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 no verify usage": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 no verify usage": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 no verify usage": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 no verify usage": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 no verify usage": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 no verify usage": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 no verify usage": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage": {
          "stNum": 68,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage": {
          "stNum": 69,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage": {
          "stNum": 70,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage": {
          "stNum": 71,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 round trip": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 round trip": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 round trip": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 round trip": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 round trip": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 round trip": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 round trip": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 round trip": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 round trip": {
          "stNum": 80,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 round trip": {
          "stNum": 81,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 round trip": {
          "stNum": 82,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 round trip": {
          "stNum": 83,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 signing with wrong algorithm name": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 signing with wrong algorithm name": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 signing with wrong algorithm name": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 signing with wrong algorithm name": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 signing with wrong algorithm name": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 signing with wrong algorithm name": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 signing with wrong algorithm name": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 signing with wrong algorithm name": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to altered signature": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to altered signature": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to altered signature": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to altered signature": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to altered signature": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to altered signature": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to altered signature": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to altered signature": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature": {
          "stNum": 108,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature": {
          "stNum": 109,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature": {
          "stNum": 110,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature": {
          "stNum": 111,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to wrong hash": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to wrong hash": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to wrong hash": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to wrong hash": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to wrong hash": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to wrong hash": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to wrong hash": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to wrong hash": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash": {
          "stNum": 120,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash": {
          "stNum": 121,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash": {
          "stNum": 122,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash": {
          "stNum": 123,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to bad hash name": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to bad hash name": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to bad hash name": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to bad hash name": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to bad hash name": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to bad hash name": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to bad hash name": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to bad hash name": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name": {
          "stNum": 132,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name": {
          "stNum": 133,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name": {
          "stNum": 134,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name": {
          "stNum": 135,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to shortened signature": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to shortened signature": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to shortened signature": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to shortened signature": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to shortened signature": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to shortened signature": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to shortened signature": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to shortened signature": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature": {
          "stNum": 144,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature": {
          "stNum": 145,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature": {
          "stNum": 146,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature": {
          "stNum": 147,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "ECDSA P-256 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-256 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "ECDSA P-384 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext": {
          "stNum": 156,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext": {
          "stNum": 157,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext": {
          "stNum": 158,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext": {
          "stNum": 159,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name": {
          "stNum": 160,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name": {
          "stNum": 161,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name": {
          "stNum": 162,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name": {
          "stNum": 163,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name": {
          "stNum": 164,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-1. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name": {
          "stNum": 165,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-256. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name": {
          "stNum": 166,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-384. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name": {
          "stNum": 167,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: importVectorKeys failed for ECDSA P-521 with SHA-512. Message: ''Data provided to an operation does not meet requirements'' Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/rsa_importKey.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_ECDSA.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [verify, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [verify, sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [verify, sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [verify, sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"NotSupportedError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"NotSupportedError\""
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "WebCryptoAPI: deriveBits() Using ECDH": {
          "stNum": 0,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "Data provided to an operation does not meet requirements"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_ECDH.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits, deriveKey])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits, deriveKey])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveBits])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveBits])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: P-512}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits, deriveKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits, deriveKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveBits])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveBits])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({name: ECDH, namedCurve: Curve25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"NotSupportedError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Empty usages not supported expected \"SyntaxError\" but got \"NotSupportedError\""
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/rsa_pss.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSA-PSS with SHA-1 and no salt verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification with altered signature after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification with altered signature after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification with altered signature after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification with altered signature after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification with altered signature after call": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification with altered signature after call": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification with altered signature after call": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification with altered signature after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt with altered plaintext after call": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt with altered plaintext after call": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt with altered plaintext after call": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt with altered plaintext after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted with altered plaintext after call": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted with altered plaintext after call": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted with altered plaintext after call": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted with altered plaintext after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt using privateKey to verify": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt using privateKey to verify": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt using privateKey to verify": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt using privateKey to verify": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted using privateKey to verify": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted using privateKey to verify": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted using privateKey to verify": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted using privateKey to verify": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt using publicKey to sign": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt using publicKey to sign": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt using publicKey to sign": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt using publicKey to sign": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted using publicKey to sign": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted using publicKey to sign": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted using publicKey to sign": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted using publicKey to sign": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt no verify usage": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt no verify usage": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt no verify usage": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt no verify usage": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted no verify usage": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted no verify usage": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted no verify usage": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted no verify usage": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt round trip": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt round trip": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt round trip": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt round trip": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted round trip": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted round trip": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted round trip": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted round trip": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt signing with wrong algorithm name": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt signing with wrong algorithm name": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt signing with wrong algorithm name": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt signing with wrong algorithm name": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted signing with wrong algorithm name": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted signing with wrong algorithm name": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted signing with wrong algorithm name": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted signing with wrong algorithm name": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification with wrong algorithm name": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification with wrong algorithm name": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification with wrong algorithm name": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification with wrong algorithm name": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification with wrong algorithm name": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification with wrong algorithm name": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification with wrong algorithm name": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification with wrong algorithm name": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification failure with altered signature": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification failure with altered signature": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification failure with altered signature": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification failure with altered signature": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification failure with altered signature": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification failure with altered signature": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification failure with altered signature": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification failure with altered signature": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1 and no salt verification failure with altered plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256 and no salt verification failure with altered plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384 and no salt verification failure with altered plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512 and no salt verification failure with altered plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-1, salted verification failure with altered plaintext": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-256, salted verification failure with altered plaintext": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-384, salted verification failure with altered plaintext": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-PSS with SHA-512, salted verification failure with altered plaintext": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Can wrap and unwrap ECDSA public key keys using spki and AES-CTR": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-CTR": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-CTR": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-CTR": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-CTR": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-CTR": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-CTR": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-CTR": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-CTR": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CTR": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-CTR": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CTR": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-CTR": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-CTR": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-CTR": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-CTR": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-CTR": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CTR": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-CTR": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CTR": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-CTR": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CTR": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CTR": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CTR": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CTR": {
          "stNum": 43,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CTR": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CTR": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CTR": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CTR": {
          "stNum": 50,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CTR": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CTR": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CTR": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CTR": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CTR": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CTR": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CTR": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and AES-CBC": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-CBC": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-CBC": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-CBC": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-CBC": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-CBC": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-CBC": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-CBC": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CBC": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-CBC": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-CBC": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-CBC": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-CBC": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-CBC": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-CBC": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-CBC": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-CBC": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-CBC": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-CBC": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-CBC": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-CBC": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-CBC": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-CBC": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-CBC": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-CBC": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-CBC": {
          "stNum": 103,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-CBC": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-CBC": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-CBC": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-CBC": {
          "stNum": 110,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-CBC": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-CBC": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-CBC": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-CBC": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-CBC": {
          "stNum": 117,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-CBC": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-CBC": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and AES-GCM": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and AES-GCM": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-GCM": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-GCM": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-GCM": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-GCM": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-GCM": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-GCM": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-GCM": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-GCM": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-GCM": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-GCM": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-GCM": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-GCM": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-GCM": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-GCM": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-GCM": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-GCM": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-GCM": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-GCM": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-GCM": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-GCM": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-GCM": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-GCM": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-GCM": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-GCM": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-GCM": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and AES-GCM": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-GCM": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using pkcs8 and AES-GCM": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-GCM": {
          "stNum": 163,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and AES-GCM": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-GCM": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using pkcs8 and AES-GCM": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-GCM": {
          "stNum": 170,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and AES-GCM": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-GCM": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using pkcs8 and AES-GCM": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using pkcs8 and AES-GCM": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-GCM": {
          "stNum": 177,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_true: Post-wrap export matches original export expected true got false"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-GCM": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-GCM": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and AES-KW": {
          "stNum": 180,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and AES-KW": {
          "stNum": 181,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 182,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and AES-KW": {
          "stNum": 184,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and AES-KW": {
          "stNum": 185,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 186,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and AES-KW": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and AES-KW": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-KW": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and AES-KW": {
          "stNum": 190,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW": {
          "stNum": 191,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and AES-KW": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and AES-KW": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-KW": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and AES-KW": {
          "stNum": 195,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW": {
          "stNum": 196,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and AES-KW": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and AES-KW": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and AES-KW": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and AES-KW": {
          "stNum": 200,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW": {
          "stNum": 201,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and AES-KW": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and AES-KW": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and AES-KW": {
          "stNum": 205,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW": {
          "stNum": 206,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and AES-KW": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and AES-KW": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and AES-KW": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and AES-KW": {
          "stNum": 210,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW": {
          "stNum": 211,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and AES-KW": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and AES-KW": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW": {
          "stNum": 214,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 215,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSASSA-PKCS1-v1_5 private key non-extractable keys using jwk and AES-KW": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and AES-KW": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW": {
          "stNum": 218,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 219,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSA-OAEP private key non-extractable keys using jwk and AES-KW": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and AES-KW": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW": {
          "stNum": 222,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for extractable key threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW": {
          "stNum": 223,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Round trip for key unwrapped non-extractable threw an error - OperationError: \"The operation failed for an operation-specific reason\" Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Can unwrap RSA-PSS private key non-extractable keys using jwk and AES-KW": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using pkcs8 and RSA-OAEP": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDSA private key non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using pkcs8 and RSA-OAEP": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using raw and RSA-OAEP": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using raw and RSA-OAEP": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using raw and RSA-OAEP": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys using jwk and RSA-OAEP": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap HMAC keys as non-extractable using jwk and RSA-OAEP": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can unwrap HMAC non-extractable keys using jwk and RSA-OAEP": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using spki and RSA-OAEP": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSASSA-PKCS1-v1_5 public key keys using jwk and RSA-OAEP": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using spki and RSA-OAEP": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-OAEP public key keys using jwk and RSA-OAEP": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using spki and RSA-OAEP": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Can wrap and unwrap RSA-PSS public key keys using jwk and RSA-OAEP": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-CTR 128-bit key": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key with altered plaintext": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key with altered plaintext": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key with altered plaintext": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key decryption with altered ciphertext": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key decryption with altered ciphertext": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key decryption with altered ciphertext": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key without encrypt usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key without encrypt usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key without encrypt usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key with mismatched key and algorithm": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key with mismatched key and algorithm": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key with mismatched key and algorithm": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key without decrypt usage": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key without decrypt usage": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key without decrypt usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 0-bit counter": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 129-bit counter": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 0-bit counter": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 129-bit counter": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 0-bit counter": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 129-bit counter": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 0-bit counter decryption": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 129-bit counter decryption": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 0-bit counter decryption": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 129-bit counter decryption": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 0-bit counter decryption": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 129-bit counter decryption": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/sign_verify/hmac.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "HMAC with SHA-1 verification": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification with altered signature after call": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification with altered signature after call": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification with altered signature after call": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification with altered signature after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 with altered plaintext after call": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 with altered plaintext after call": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 with altered plaintext after call": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 with altered plaintext after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 no verify usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 no verify usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 no verify usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 no verify usage": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 round trip": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 round trip": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 round trip": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 round trip": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 signing with wrong algorithm name": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 signing with wrong algorithm name": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 signing with wrong algorithm name": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 signing with wrong algorithm name": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verifying with wrong algorithm name": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verifying with wrong algorithm name": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verifying with wrong algorithm name": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verifying with wrong algorithm name": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to wrong plaintext": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to wrong plaintext": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to wrong plaintext": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to wrong plaintext": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to wrong signature": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to wrong signature": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to wrong signature": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to wrong signature": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-1 verification failure due to short signature": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-256 verification failure due to short signature": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-384 verification failure due to short signature": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "HMAC with SHA-512 verification failure due to short signature": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.html?1-1000": {
      "byUA": {
        "Sf12": "TIMEOUT"
      },
      "UAmessage": {},
      "totals": {
        "TIMEOUT": 1
      },
      "subtests": {
        "undefined": {
          "stNum": 0,
          "byUA": {
            "Sf12": "TIMEOUT"
          },
          "UAmessage": {},
          "totals": {
            "TIMEOUT": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt, encrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt, encrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, encrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, encrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, encrypt])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, encrypt])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/getRandomValues.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Float arrays": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Integer array": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Large length": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Null arrays": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 480,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 481,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 482,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify])": {
          "stNum": 483,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 484,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 485,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify])": {
          "stNum": 486,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify])": {
          "stNum": 487,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 488,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 489,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify])": {
          "stNum": 490,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 491,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify])": {
          "stNum": 492,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 493,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey])": {
          "stNum": 494,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey])": {
          "stNum": 495,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 496,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 497,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 498,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 499,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 500,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 501,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 502,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey])": {
          "stNum": 503,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 504,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 505,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 506,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey])": {
          "stNum": 507,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 508,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey])": {
          "stNum": 509,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 510,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits])": {
          "stNum": 511,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits])": {
          "stNum": 512,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 513,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 514,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 515,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 516,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 517,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 518,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 519,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits])": {
          "stNum": 520,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 521,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 522,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 523,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits])": {
          "stNum": 524,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 525,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits])": {
          "stNum": 526,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 527,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt])": {
          "stNum": 528,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt])": {
          "stNum": 529,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 530,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 531,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 532,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 533,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 534,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 535,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 536,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 537,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 538,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 539,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 540,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 541,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 542,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 543,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt])": {
          "stNum": 544,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt])": {
          "stNum": 545,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 546,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 547,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 548,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 549,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 550,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 551,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 552,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 553,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 554,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 555,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 556,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 557,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [])": {
          "stNum": 558,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [])": {
          "stNum": 559,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 560,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 561,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt])": {
          "stNum": 562,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt])": {
          "stNum": 563,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 564,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 565,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 566,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 567,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 568,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 569,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 570,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 571,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 572,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 573,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 574,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 575,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 576,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 577,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt])": {
          "stNum": 578,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt])": {
          "stNum": 579,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 580,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 581,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 582,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 583,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 584,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 585,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 586,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 587,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 588,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 589,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 590,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 591,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [])": {
          "stNum": 592,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [])": {
          "stNum": 593,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 594,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 595,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt])": {
          "stNum": 596,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt])": {
          "stNum": 597,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 598,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 599,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 600,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 601,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 602,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 603,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 604,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 605,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 606,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 607,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 608,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 609,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 610,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 611,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt])": {
          "stNum": 612,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt])": {
          "stNum": 613,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 614,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 615,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 616,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 617,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 618,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 619,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 620,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 621,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 622,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 623,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 624,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 625,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [])": {
          "stNum": 626,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [])": {
          "stNum": 627,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 628,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 629,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt])": {
          "stNum": 630,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt])": {
          "stNum": 631,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 632,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 633,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 634,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 635,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 636,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 637,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 638,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 639,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 640,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 641,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 642,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 643,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 644,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 645,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt])": {
          "stNum": 646,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt])": {
          "stNum": 647,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 648,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 649,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 650,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 651,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 652,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 653,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 654,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 655,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 656,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 657,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 658,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 659,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [])": {
          "stNum": 660,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [])": {
          "stNum": 661,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 662,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 663,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt])": {
          "stNum": 664,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt])": {
          "stNum": 665,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 666,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 667,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 668,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 669,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 670,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 671,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 672,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 673,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 674,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 675,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 676,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 677,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 678,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 679,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt])": {
          "stNum": 680,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt])": {
          "stNum": 681,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 682,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 683,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 684,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 685,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 686,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 687,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 688,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 689,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 690,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 691,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 692,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 693,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [])": {
          "stNum": 694,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [])": {
          "stNum": 695,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 696,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 697,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt])": {
          "stNum": 698,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt])": {
          "stNum": 699,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 700,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 701,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 702,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 703,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 704,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 705,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 706,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 707,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt])": {
          "stNum": 708,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt])": {
          "stNum": 709,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 710,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 711,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt])": {
          "stNum": 712,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt])": {
          "stNum": 713,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt])": {
          "stNum": 714,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt])": {
          "stNum": 715,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt])": {
          "stNum": 716,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt])": {
          "stNum": 717,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 718,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 719,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt])": {
          "stNum": 720,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt])": {
          "stNum": 721,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey])": {
          "stNum": 722,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey])": {
          "stNum": 723,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey])": {
          "stNum": 724,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey])": {
          "stNum": 725,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey])": {
          "stNum": 726,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey])": {
          "stNum": 727,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [])": {
          "stNum": 728,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [])": {
          "stNum": 729,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 730,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 731,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-GCM}, false, [])": {
          "stNum": 732,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-GCM}, true, [])": {
          "stNum": 733,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-GCM}, false, [])": {
          "stNum": 734,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-GCM}, true, [])": {
          "stNum": 735,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-GCM}, false, [])": {
          "stNum": 736,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-GCM}, true, [])": {
          "stNum": 737,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/test_rsa_importKey.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "RSA-OAEP with SHA-1 and no label decryption": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label decryption": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label decryption": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label decryption": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label decryption": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label decryption": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label decryption": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label decryption": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label decryption": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label decryption with altered ciphertext": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label decryption with altered ciphertext": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label decryption with altered ciphertext": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label decryption with altered ciphertext": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label decryption with altered ciphertext": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label decryption with altered ciphertext": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label decryption with altered ciphertext": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label decryption with altered ciphertext": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label using publicKey to decrypt": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label using publicKey to decrypt": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label using publicKey to decrypt": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label using publicKey to decrypt": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label using publicKey to decrypt": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label using publicKey to decrypt": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label using publicKey to decrypt": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label using publicKey to decrypt": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label using publicKey to decrypt": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label using publicKey to decrypt": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label using publicKey to decrypt": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label using publicKey to decrypt": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label no decrypt usage": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label no decrypt usage": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label no decrypt usage": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label no decrypt usage": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label no decrypt usage": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label no decrypt usage": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label no decrypt usage": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label no decrypt usage": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label no decrypt usage": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label no decrypt usage": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label no decrypt usage": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label no decrypt usage": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label with altered plaintext": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label with altered plaintext": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label with altered plaintext": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label with altered plaintext": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label with altered plaintext": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label with altered plaintext": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label with altered plaintext": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label with altered plaintext": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label with altered plaintext": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label with altered plaintext": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label with altered plaintext": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label with altered plaintext": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label too long plaintext": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label too long plaintext": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label too long plaintext": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label too long plaintext": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label too long plaintext": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label too long plaintext": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label too long plaintext": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label too long plaintext": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label too long plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label too long plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label too long plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label too long plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label using privateKey to encrypt": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label using privateKey to encrypt": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label using privateKey to encrypt": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label using privateKey to encrypt": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label using privateKey to encrypt": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label using privateKey to encrypt": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label using privateKey to encrypt": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label using privateKey to encrypt": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label using privateKey to encrypt": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label using privateKey to encrypt": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label using privateKey to encrypt": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label using privateKey to encrypt": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and no label no encrypt usage": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and no label no encrypt usage": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and no label no encrypt usage": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and no label no encrypt usage": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and empty label no encrypt usage": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and empty label no encrypt usage": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and empty label no encrypt usage": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and empty label no encrypt usage": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-1 and a label no encrypt usage": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-256 and a label no encrypt usage": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-384 and a label no encrypt usage": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with SHA-512 and a label no encrypt usage": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/digest/test_digest.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "SHA-1 with empty source data": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with empty source data": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with empty source data": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with empty source data and altered buffer after call": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with empty source data": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with empty source data": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with empty source data": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with empty source data and altered buffer after call": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with empty source data": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with empty source data": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with empty source data": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with empty source data and altered buffer after call": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with empty source data": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with empty source data": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with empty source data": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with empty source data and altered buffer after call": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with short source data": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with short source data": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with short source data": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with short source data and altered buffer after call": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with short source data": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with short source data": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with short source data": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with short source data and altered buffer after call": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with short source data": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with short source data": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with short source data": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with short source data and altered buffer after call": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with short source data": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with short source data": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with short source data": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with short source data and altered buffer after call": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with medium source data": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with medium source data": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with medium source data": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with medium source data and altered buffer after call": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with medium source data": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with medium source data": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with medium source data": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with medium source data and altered buffer after call": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with medium source data": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with medium source data": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with medium source data": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with medium source data and altered buffer after call": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with medium source data": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with medium source data": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with medium source data": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with medium source data and altered buffer after call": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with long source data": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-1 with long source data": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-1 with long source data": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-1 with long source data and altered buffer after call": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with long source data": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-256 with long source data": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-256 with long source data": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-256 with long source data and altered buffer after call": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with long source data": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-384 with long source data": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-384 with long source data": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-384 with long source data and altered buffer after call": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with long source data": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "sha-512 with long source data": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Sha-512 with long source data": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SHA-512 with long source data and altered buffer after call": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with empty": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with empty": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with empty": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with empty": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with short": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with short": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with short": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with short": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with medium": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with medium": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with medium": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with medium": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM with long": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "RSA-OAEP with long": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "PBKDF2 with long": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-KW with long": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_ECDSA.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Bad algorithm: generateKey(AES, false, [decrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign, decrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign, decrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign, decrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign, decrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [sign])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [sign])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits, sign])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits, sign])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits, sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits, sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [deriveBits])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [deriveBits])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [deriveBits])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [deriveBits])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [sign])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [sign])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [sign])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [sign])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])": {
          "stNum": 299,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])": {
          "stNum": 305,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])": {
          "stNum": 311,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])": {
          "stNum": 317,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])": {
          "stNum": 323,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign])": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign])": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign])": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 329,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign])": {
          "stNum": 330,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 331,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 332,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign])": {
          "stNum": 333,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign])": {
          "stNum": 334,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 335,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 336,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign])": {
          "stNum": 337,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 338,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign])": {
          "stNum": 339,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 340,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify])": {
          "stNum": 341,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify])": {
          "stNum": 342,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify])": {
          "stNum": 343,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 344,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 345,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 346,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify])": {
          "stNum": 347,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 348,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 349,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify])": {
          "stNum": 350,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify])": {
          "stNum": 351,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 352,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 353,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify])": {
          "stNum": 354,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 355,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify])": {
          "stNum": 356,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 357,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey])": {
          "stNum": 358,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey])": {
          "stNum": 359,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 360,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 361,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 362,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 363,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 364,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 365,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 366,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey])": {
          "stNum": 367,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 368,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 369,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 370,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey])": {
          "stNum": 371,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 372,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey])": {
          "stNum": 373,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 374,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits])": {
          "stNum": 375,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits])": {
          "stNum": 376,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 377,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 378,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 379,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 380,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 381,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 382,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 383,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits])": {
          "stNum": 384,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 385,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 386,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 387,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits])": {
          "stNum": 388,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 389,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits])": {
          "stNum": 390,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 391,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign])": {
          "stNum": 392,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign])": {
          "stNum": 393,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign])": {
          "stNum": 394,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 395,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 396,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 397,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign])": {
          "stNum": 398,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 399,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 400,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign])": {
          "stNum": 401,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign])": {
          "stNum": 402,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 403,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 404,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign])": {
          "stNum": 405,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 406,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign])": {
          "stNum": 407,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 408,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify])": {
          "stNum": 409,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify])": {
          "stNum": 410,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify])": {
          "stNum": 411,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 412,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 413,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 414,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify])": {
          "stNum": 415,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 416,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 417,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify])": {
          "stNum": 418,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify])": {
          "stNum": 419,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 420,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 421,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify])": {
          "stNum": 422,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 423,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify])": {
          "stNum": 424,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 425,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey])": {
          "stNum": 426,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey])": {
          "stNum": 427,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 428,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 429,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 430,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 431,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 432,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 433,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 434,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey])": {
          "stNum": 435,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 436,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 437,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 438,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey])": {
          "stNum": 439,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 440,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey])": {
          "stNum": 441,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 442,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits])": {
          "stNum": 443,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits])": {
          "stNum": 444,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 445,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 446,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 447,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 448,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 449,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 450,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 451,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits])": {
          "stNum": 452,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 453,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 454,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 455,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits])": {
          "stNum": 456,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 457,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits])": {
          "stNum": 458,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 459,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign])": {
          "stNum": 460,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign])": {
          "stNum": 461,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign])": {
          "stNum": 462,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign])": {
          "stNum": 463,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign])": {
          "stNum": 464,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign])": {
          "stNum": 465,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign])": {
          "stNum": 466,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign])": {
          "stNum": 467,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign])": {
          "stNum": 468,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign])": {
          "stNum": 469,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign])": {
          "stNum": 470,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign])": {
          "stNum": 471,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign])": {
          "stNum": 472,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign])": {
          "stNum": 473,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign])": {
          "stNum": 474,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign])": {
          "stNum": 475,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign])": {
          "stNum": 476,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify])": {
          "stNum": 477,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify])": {
          "stNum": 478,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify])": {
          "stNum": 479,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify])": {
          "stNum": 480,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify])": {
          "stNum": 481,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify])": {
          "stNum": 482,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify])": {
          "stNum": 483,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify])": {
          "stNum": 484,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify])": {
          "stNum": 485,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify])": {
          "stNum": 486,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify])": {
          "stNum": 487,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify])": {
          "stNum": 488,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify])": {
          "stNum": 489,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify])": {
          "stNum": 490,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify])": {
          "stNum": 491,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify])": {
          "stNum": 492,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify])": {
          "stNum": 493,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey])": {
          "stNum": 494,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey])": {
          "stNum": 495,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey])": {
          "stNum": 496,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 497,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 498,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey])": {
          "stNum": 499,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey])": {
          "stNum": 500,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey])": {
          "stNum": 501,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey])": {
          "stNum": 502,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey])": {
          "stNum": 503,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey])": {
          "stNum": 504,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey])": {
          "stNum": 505,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey])": {
          "stNum": 506,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey])": {
          "stNum": 507,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey])": {
          "stNum": 508,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey])": {
          "stNum": 509,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey])": {
          "stNum": 510,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits])": {
          "stNum": 511,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits])": {
          "stNum": 512,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits])": {
          "stNum": 513,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 514,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 515,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits])": {
          "stNum": 516,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits])": {
          "stNum": 517,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits])": {
          "stNum": 518,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits])": {
          "stNum": 519,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits])": {
          "stNum": 520,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits])": {
          "stNum": 521,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits])": {
          "stNum": 522,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits])": {
          "stNum": 523,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits])": {
          "stNum": 524,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits])": {
          "stNum": 525,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits])": {
          "stNum": 526,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits])": {
          "stNum": 527,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt])": {
          "stNum": 528,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt])": {
          "stNum": 529,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 530,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 531,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 532,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 533,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 534,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 535,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 536,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 537,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 538,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 539,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 540,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 541,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 542,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 543,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt])": {
          "stNum": 544,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt])": {
          "stNum": 545,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 546,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 547,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 548,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 549,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 550,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 551,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 552,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 553,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 554,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 555,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 556,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 557,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [])": {
          "stNum": 558,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [])": {
          "stNum": 559,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 560,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 561,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt])": {
          "stNum": 562,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt])": {
          "stNum": 563,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 564,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 565,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 566,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 567,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 568,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 569,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 570,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 571,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 572,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 573,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 574,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 575,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 576,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 577,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt])": {
          "stNum": 578,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt])": {
          "stNum": 579,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 580,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 581,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 582,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 583,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 584,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 585,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 586,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 587,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 588,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 589,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 590,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 591,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [])": {
          "stNum": 592,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [])": {
          "stNum": 593,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 594,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 595,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt])": {
          "stNum": 596,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt])": {
          "stNum": 597,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 598,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 599,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 600,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 601,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 602,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 603,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 604,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 605,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 606,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 607,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 608,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 609,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 610,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 611,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt])": {
          "stNum": 612,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt])": {
          "stNum": 613,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 614,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 615,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 616,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 617,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 618,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 619,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 620,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 621,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 622,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 623,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 624,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 625,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [])": {
          "stNum": 626,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [])": {
          "stNum": 627,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 628,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 629,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt])": {
          "stNum": 630,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt])": {
          "stNum": 631,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 632,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 633,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 634,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 635,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 636,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 637,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 638,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 639,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 640,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 641,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 642,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 643,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 644,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 645,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt])": {
          "stNum": 646,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt])": {
          "stNum": 647,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 648,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 649,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 650,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 651,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 652,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 653,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 654,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 655,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 656,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 657,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 658,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 659,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [])": {
          "stNum": 660,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [])": {
          "stNum": 661,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 662,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 663,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt])": {
          "stNum": 664,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt])": {
          "stNum": 665,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 666,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 667,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 668,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 669,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 670,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 671,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 672,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 673,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 674,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 675,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 676,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 677,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 678,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 679,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt])": {
          "stNum": 680,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt])": {
          "stNum": 681,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 682,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 683,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 684,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 685,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 686,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 687,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 688,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 689,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 690,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 691,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 692,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 693,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [])": {
          "stNum": 694,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [])": {
          "stNum": 695,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 696,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 697,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt])": {
          "stNum": 698,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt])": {
          "stNum": 699,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 700,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 701,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 702,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 703,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 704,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 705,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 706,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 707,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 708,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 709,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 710,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 711,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 712,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 713,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt])": {
          "stNum": 714,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt])": {
          "stNum": 715,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 716,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 717,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 718,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 719,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 720,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 721,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 722,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 723,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 724,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 725,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 726,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 727,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [])": {
          "stNum": 728,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [])": {
          "stNum": 729,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 730,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 731,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-CBC}, false, [])": {
          "stNum": 732,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 128, name: AES-CBC}, true, [])": {
          "stNum": 733,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-CBC}, false, [])": {
          "stNum": 734,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 192, name: AES-CBC}, true, [])": {
          "stNum": 735,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-CBC}, false, [])": {
          "stNum": 736,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Empty usages: generateKey({length: 256, name: AES-CBC}, true, [])": {
          "stNum": 737,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/test_ec_importKey.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: DataError: Data provided to an operation does not meet requirements Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_ECDH.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: Threw an unexpected error: NotSupportedError: The algorithm is not supported Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/idlharness.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "idl_test setup": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Partial interface mixin WindowOrWorkerGlobalScope: original interface mixin defined": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: existence and properties of interface object": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface object length": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface object name": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: existence and properties of interface prototype object": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: existence and properties of interface prototype object's \"constructor\" property": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: existence and properties of interface prototype object's @@unscopables property": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: attribute subtle": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: operation getRandomValues(ArrayBufferView)": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto must be primary interface of crypto": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Stringification of crypto": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: crypto must inherit property \"subtle\" with the proper type": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: crypto must inherit property \"getRandomValues(ArrayBufferView)\" with the proper type": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Crypto interface: calling getRandomValues(ArrayBufferView) on crypto with too few arguments must throw TypeError": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: existence and properties of interface object": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface object length": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface object name": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: existence and properties of interface prototype object": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: existence and properties of interface prototype object's \"constructor\" property": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: existence and properties of interface prototype object's @@unscopables property": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: attribute type": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: attribute extractable": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: attribute algorithm": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "CryptoKey interface: attribute usages": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: existence and properties of interface object": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface object length": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface object name": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: existence and properties of interface prototype object": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: existence and properties of interface prototype object's \"constructor\" property": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto must be primary interface of crypto.subtle": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Stringification of crypto.subtle": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"sign(AlgorithmIdentifier, CryptoKey, BufferSource)\" with the proper type": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)\" with the proper type": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"digest(AlgorithmIdentifier, BufferSource)\" with the proper type": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"generateKey(AlgorithmIdentifier, boolean, [object Object])\" with the proper type": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object])\" with the proper type": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)\" with the proper type": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object])\" with the proper type": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling importKey(KeyFormat, [object Object],[object Object], AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"exportKey(KeyFormat, CryptoKey)\" with the proper type": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)\" with the proper type": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object])\" with the proper type": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object]) on crypto.subtle with too few arguments must throw TypeError": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Window interface: attribute crypto": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "WorkerGlobalScope interface: existence and properties of interface object": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-CBC 128-bit key": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key with altered plaintext": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key with altered plaintext": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key with altered plaintext": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key decryption with altered ciphertext": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key decryption with altered ciphertext": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key decryption with altered ciphertext": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key without encrypt usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key without encrypt usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key without encrypt usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key with mismatched key and algorithm": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key with mismatched key and algorithm": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key with mismatched key and algorithm": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key without decrypt usage": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key without decrypt usage": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key without decrypt usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 64-bit IV": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 192-bit IV": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 64-bit IV": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 192-bit IV": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 64-bit IV": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 192-bit IV": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 64-bit IV decryption": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 192-bit IV decryption": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 64-bit IV decryption": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 192-bit IV decryption": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 64-bit IV decryption": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 192-bit IV decryption": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, zeroPadChar": {
          "stNum": 33,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 128-bit key, bigPadChar": {
          "stNum": 34,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 128-bit key, inconsistentPadChars": {
          "stNum": 35,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, zeroPadChar": {
          "stNum": 36,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, bigPadChar": {
          "stNum": 37,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, inconsistentPadChars": {
          "stNum": 38,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, zeroPadChar": {
          "stNum": 39,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, bigPadChar": {
          "stNum": 40,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, inconsistentPadChars": {
          "stNum": 41,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-CBC 128-bit key": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key with altered plaintext": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key with altered plaintext": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key with altered plaintext": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key decryption with altered ciphertext": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key decryption with altered ciphertext": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key decryption with altered ciphertext": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key without encrypt usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key without encrypt usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key without encrypt usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key with mismatched key and algorithm": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key with mismatched key and algorithm": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key with mismatched key and algorithm": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key without decrypt usage": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key without decrypt usage": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key without decrypt usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 64-bit IV": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 192-bit IV": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 64-bit IV": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 192-bit IV": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 64-bit IV": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 192-bit IV": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 64-bit IV decryption": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, 192-bit IV decryption": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 64-bit IV decryption": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 192-bit key, 192-bit IV decryption": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 64-bit IV decryption": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 256-bit key, 192-bit IV decryption": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CBC 128-bit key, zeroPadChar": {
          "stNum": 33,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 128-bit key, bigPadChar": {
          "stNum": 34,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 128-bit key, inconsistentPadChars": {
          "stNum": 35,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 128-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, zeroPadChar": {
          "stNum": 36,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, bigPadChar": {
          "stNum": 37,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 192-bit key, inconsistentPadChars": {
          "stNum": 38,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 192-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, zeroPadChar": {
          "stNum": 39,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, zeroPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, bigPadChar": {
          "stNum": 40,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, bigPadChar Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-CBC 256-bit key, inconsistentPadChars": {
          "stNum": 41,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_unreached: should have thrown exception for test AES-CBC 256-bit key, inconsistentPadChars Reached unreachable code"
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/import_export/test_symmetric_importKey.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.html?1-10": {
      "byUA": {
        "Sf12": "TIMEOUT"
      },
      "UAmessage": {},
      "totals": {
        "TIMEOUT": 1
      },
      "subtests": {
        "undefined": {
          "stNum": 0,
          "byUA": {
            "Sf12": "TIMEOUT"
          },
          "UAmessage": {},
          "totals": {
            "TIMEOUT": 1
          }
        }
      }
    },
    "/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt])": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt])": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt])": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt])": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt])": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt])": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt])": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt])": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt])": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt])": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt, encrypt])": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt])": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, encrypt])": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt])": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, encrypt])": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt])": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt])": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt])": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt])": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt])": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt])": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt])": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey])": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey])": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey])": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey])": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey])": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey])": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt])": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt])": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt])": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt])": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey])": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey])": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey])": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey])": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt])": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt])": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt])": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt])": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey])": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey])": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey])": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey])": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt])": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt])": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt])": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt])": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey])": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey])": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey])": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey])": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt])": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt])": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt])": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt])": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey])": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey])": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey])": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey])": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt])": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt])": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt])": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt])": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey])": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey])": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey])": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey])": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt])": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt])": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt, encrypt])": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt])": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, encrypt])": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt])": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, encrypt])": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt])": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt])": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt])": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt])": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt])": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt])": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt])": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey])": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey])": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey])": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey])": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey])": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey])": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.worker.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-GCM 128-bit key, 32-bit tag": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag": {
          "stNum": 33,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag": {
          "stNum": 34,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag": {
          "stNum": 35,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag": {
          "stNum": 36,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag": {
          "stNum": 37,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag": {
          "stNum": 38,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag": {
          "stNum": 39,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag": {
          "stNum": 40,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag": {
          "stNum": 41,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag with altered plaintext": {
          "stNum": 42,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 43,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag with altered plaintext": {
          "stNum": 44,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 45,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag with altered plaintext": {
          "stNum": 46,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 47,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag with altered plaintext": {
          "stNum": 48,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 49,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag with altered plaintext": {
          "stNum": 50,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 51,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag with altered plaintext": {
          "stNum": 52,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 53,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag with altered plaintext": {
          "stNum": 54,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 55,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag with altered plaintext": {
          "stNum": 56,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 57,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag with altered plaintext": {
          "stNum": 58,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 59,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag with altered plaintext": {
          "stNum": 60,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 61,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag with altered plaintext": {
          "stNum": 62,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 63,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag with altered plaintext": {
          "stNum": 64,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 65,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag with altered plaintext": {
          "stNum": 66,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 67,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag with altered plaintext": {
          "stNum": 68,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 69,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag with altered plaintext": {
          "stNum": 70,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext": {
          "stNum": 71,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag with altered plaintext": {
          "stNum": 72,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext": {
          "stNum": 73,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag with altered plaintext": {
          "stNum": 74,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext": {
          "stNum": 75,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag with altered plaintext": {
          "stNum": 76,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext": {
          "stNum": 77,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag with altered plaintext": {
          "stNum": 78,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext": {
          "stNum": 79,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag with altered plaintext": {
          "stNum": 80,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext": {
          "stNum": 81,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag with altered plaintext": {
          "stNum": 82,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext": {
          "stNum": 83,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag decryption": {
          "stNum": 84,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 85,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag decryption": {
          "stNum": 86,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 87,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag decryption": {
          "stNum": 88,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 89,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag decryption": {
          "stNum": 90,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 91,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag decryption": {
          "stNum": 92,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 93,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag decryption": {
          "stNum": 94,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 95,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag decryption": {
          "stNum": 96,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 97,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag decryption": {
          "stNum": 98,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 99,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag decryption": {
          "stNum": 100,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 101,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag decryption": {
          "stNum": 102,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 103,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag decryption": {
          "stNum": 104,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 105,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag decryption": {
          "stNum": 106,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 107,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag decryption": {
          "stNum": 108,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 109,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag decryption": {
          "stNum": 110,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 111,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag decryption": {
          "stNum": 112,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag decryption": {
          "stNum": 113,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag decryption": {
          "stNum": 114,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag decryption": {
          "stNum": 115,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag decryption": {
          "stNum": 116,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag decryption": {
          "stNum": 117,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag decryption": {
          "stNum": 118,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag decryption": {
          "stNum": 119,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag decryption": {
          "stNum": 120,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag decryption": {
          "stNum": 121,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag decryption": {
          "stNum": 122,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag decryption": {
          "stNum": 123,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag decryption": {
          "stNum": 124,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag decryption": {
          "stNum": 125,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 126,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 127,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 128,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 129,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 130,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 131,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 132,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 133,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 134,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 135,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 136,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 137,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 138,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 139,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 140,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 141,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 142,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 143,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 144,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 145,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 146,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 147,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 148,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 149,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 150,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 151,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 152,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 153,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext": {
          "stNum": 154,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext": {
          "stNum": 155,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext": {
          "stNum": 156,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext": {
          "stNum": 157,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext": {
          "stNum": 158,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext": {
          "stNum": 159,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext": {
          "stNum": 160,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext": {
          "stNum": 161,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext": {
          "stNum": 162,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext": {
          "stNum": 163,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext": {
          "stNum": 164,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext": {
          "stNum": 165,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext": {
          "stNum": 166,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext": {
          "stNum": 167,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag without encrypt usage": {
          "stNum": 168,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 169,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag without encrypt usage": {
          "stNum": 170,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 171,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag without encrypt usage": {
          "stNum": 172,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 173,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag without encrypt usage": {
          "stNum": 174,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 175,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag without encrypt usage": {
          "stNum": 176,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 177,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag without encrypt usage": {
          "stNum": 178,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 179,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag without encrypt usage": {
          "stNum": 180,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 181,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag without encrypt usage": {
          "stNum": 182,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 183,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag without encrypt usage": {
          "stNum": 184,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 185,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag without encrypt usage": {
          "stNum": 186,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 187,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag without encrypt usage": {
          "stNum": 188,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 189,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag without encrypt usage": {
          "stNum": 190,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 191,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag without encrypt usage": {
          "stNum": 192,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 193,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag without encrypt usage": {
          "stNum": 194,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 195,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag without encrypt usage": {
          "stNum": 196,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage": {
          "stNum": 197,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag without encrypt usage": {
          "stNum": 198,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage": {
          "stNum": 199,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag without encrypt usage": {
          "stNum": 200,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage": {
          "stNum": 201,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag without encrypt usage": {
          "stNum": 202,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage": {
          "stNum": 203,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag without encrypt usage": {
          "stNum": 204,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage": {
          "stNum": 205,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag without encrypt usage": {
          "stNum": 206,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage": {
          "stNum": 207,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag without encrypt usage": {
          "stNum": 208,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage": {
          "stNum": 209,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 210,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 211,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 212,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 213,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 214,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 215,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 216,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 217,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 218,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 219,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 220,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 221,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 222,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 223,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 224,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 225,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 226,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 227,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 228,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 229,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 230,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 231,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 232,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 233,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 234,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 235,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 236,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 237,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm": {
          "stNum": 238,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm": {
          "stNum": 239,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm": {
          "stNum": 240,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm": {
          "stNum": 241,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm": {
          "stNum": 242,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm": {
          "stNum": 243,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm": {
          "stNum": 244,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm": {
          "stNum": 245,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm": {
          "stNum": 246,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm": {
          "stNum": 247,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm": {
          "stNum": 248,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm": {
          "stNum": 249,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm": {
          "stNum": 250,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm": {
          "stNum": 251,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 32-bit tag without decrypt usage": {
          "stNum": 252,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 253,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 64-bit tag without decrypt usage": {
          "stNum": 254,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 255,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 96-bit tag without decrypt usage": {
          "stNum": 256,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 257,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 104-bit tag without decrypt usage": {
          "stNum": 258,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 259,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 112-bit tag without decrypt usage": {
          "stNum": 260,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 261,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 120-bit tag without decrypt usage": {
          "stNum": 262,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 263,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, 128-bit tag without decrypt usage": {
          "stNum": 264,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 265,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 32-bit tag without decrypt usage": {
          "stNum": 266,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 267,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 64-bit tag without decrypt usage": {
          "stNum": 268,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 269,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 96-bit tag without decrypt usage": {
          "stNum": 270,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 271,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 104-bit tag without decrypt usage": {
          "stNum": 272,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 273,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 112-bit tag without decrypt usage": {
          "stNum": 274,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 275,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 120-bit tag without decrypt usage": {
          "stNum": 276,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 277,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, 128-bit tag without decrypt usage": {
          "stNum": 278,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 279,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 32-bit tag without decrypt usage": {
          "stNum": 280,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage": {
          "stNum": 281,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 64-bit tag without decrypt usage": {
          "stNum": 282,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage": {
          "stNum": 283,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 96-bit tag without decrypt usage": {
          "stNum": 284,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage": {
          "stNum": 285,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 104-bit tag without decrypt usage": {
          "stNum": 286,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage": {
          "stNum": 287,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 112-bit tag without decrypt usage": {
          "stNum": 288,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage": {
          "stNum": 289,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 120-bit tag without decrypt usage": {
          "stNum": 290,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage": {
          "stNum": 291,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, 128-bit tag without decrypt usage": {
          "stNum": 292,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage": {
          "stNum": 293,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 24-bits": {
          "stNum": 294,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 48-bits": {
          "stNum": 295,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 72-bits": {
          "stNum": 296,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 95-bits": {
          "stNum": 297,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 129-bits": {
          "stNum": 298,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 256-bits": {
          "stNum": 299,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 24-bits": {
          "stNum": 300,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 48-bits": {
          "stNum": 301,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 72-bits": {
          "stNum": 302,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 95-bits": {
          "stNum": 303,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 129-bits": {
          "stNum": 304,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 256-bits": {
          "stNum": 305,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 24-bits": {
          "stNum": 306,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 48-bits": {
          "stNum": 307,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 72-bits": {
          "stNum": 308,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 95-bits": {
          "stNum": 309,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 129-bits": {
          "stNum": 310,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 256-bits": {
          "stNum": 311,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 24-bits decryption": {
          "stNum": 312,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 48-bits decryption": {
          "stNum": 313,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 72-bits decryption": {
          "stNum": 314,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 95-bits decryption": {
          "stNum": 315,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 129-bits decryption": {
          "stNum": 316,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 128-bit key, illegal tag length 256-bits decryption": {
          "stNum": 317,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 24-bits decryption": {
          "stNum": 318,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 48-bits decryption": {
          "stNum": 319,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 72-bits decryption": {
          "stNum": 320,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 95-bits decryption": {
          "stNum": 321,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 129-bits decryption": {
          "stNum": 322,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 192-bit key, illegal tag length 256-bits decryption": {
          "stNum": 323,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 24-bits decryption": {
          "stNum": 324,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 48-bits decryption": {
          "stNum": 325,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 72-bits decryption": {
          "stNum": 326,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 95-bits decryption": {
          "stNum": 327,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 129-bits decryption": {
          "stNum": 328,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-GCM 256-bit key, illegal tag length 256-bits decryption": {
          "stNum": 329,
          "byUA": {
            "Sf12": "FAIL"
          },
          "UAmessage": {
            "Sf12": "assert_equals: Should throw an OperationError instead of Type error expected \"OperationError\" but got \"TypeError\""
          },
          "totals": {
            "FAIL": 1
          }
        }
      }
    },
    "/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.https.html": {
      "byUA": {
        "Sf12": "OK"
      },
      "UAmessage": {},
      "totals": {
        "OK": 1
      },
      "subtests": {
        "AES-CTR 128-bit key": {
          "stNum": 0,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key": {
          "stNum": 1,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key": {
          "stNum": 2,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key with altered plaintext": {
          "stNum": 3,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key with altered plaintext": {
          "stNum": 4,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key with altered plaintext": {
          "stNum": 5,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key decryption": {
          "stNum": 6,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key decryption": {
          "stNum": 7,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key decryption": {
          "stNum": 8,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key decryption with altered ciphertext": {
          "stNum": 9,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key decryption with altered ciphertext": {
          "stNum": 10,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key decryption with altered ciphertext": {
          "stNum": 11,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key without encrypt usage": {
          "stNum": 12,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key without encrypt usage": {
          "stNum": 13,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key without encrypt usage": {
          "stNum": 14,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key with mismatched key and algorithm": {
          "stNum": 15,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key with mismatched key and algorithm": {
          "stNum": 16,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key with mismatched key and algorithm": {
          "stNum": 17,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key without decrypt usage": {
          "stNum": 18,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key without decrypt usage": {
          "stNum": 19,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key without decrypt usage": {
          "stNum": 20,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 0-bit counter": {
          "stNum": 21,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 129-bit counter": {
          "stNum": 22,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 0-bit counter": {
          "stNum": 23,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 129-bit counter": {
          "stNum": 24,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 0-bit counter": {
          "stNum": 25,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 129-bit counter": {
          "stNum": 26,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 0-bit counter decryption": {
          "stNum": 27,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 128-bit key, 129-bit counter decryption": {
          "stNum": 28,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 0-bit counter decryption": {
          "stNum": 29,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 192-bit key, 129-bit counter decryption": {
          "stNum": 30,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 0-bit counter decryption": {
          "stNum": 31,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        },
        "AES-CTR 256-bit key, 129-bit counter decryption": {
          "stNum": 32,
          "byUA": {
            "Sf12": "PASS"
          },
          "UAmessage": {},
          "totals": {
            "PASS": 1
          }
        }
      }
    }
  }
}