From f4578afdfe281db7d065a578782243248640aab5 Mon Sep 17 00:00:00 2001 From: Martin Robinson Date: Thu, 22 Jun 2023 14:35:02 +0200 Subject: Rename metadata directories MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This renames: - `tests/wpt/metadata` → `tests/wpt/meta-legacy-layout` - `tests/wpt/metadata-layout-2020` → `tests/wpt/meta` - `tests/wpt/mozilla/meta` → `tests/wpt/mozilla/meta-legacy-layout` - `tests/wpt/mozilla/meta-layout-2020` → `tests/wpt/mozilla/meta` --- .../algorithm-discards-context.https.window.js.ini | 40 + .../cfrg_curves_bits.https.any.js.ini | 74 + .../cfrg_curves_keys.https.any.js.ini | 86 + .../WebCryptoAPI/digest/digest.https.any.js.ini | 482 ++++ .../encrypt_decrypt/aes_cbc.https.any.js.ini | 5 + .../encrypt_decrypt/aes_ctr.https.any.js.ini | 5 + .../encrypt_decrypt/aes_gcm.https.any.js.ini | 5 + .../encrypt_decrypt/rsa_oaep.https.any.js.ini | 5 + .../generateKey/failures_Ed25519.https.any.js.ini | 5 + .../generateKey/failures_Ed448.https.any.js.ini | 5 + .../generateKey/failures_X25519.https.any.js.ini | 5 + .../generateKey/failures_X448.https.any.js.ini | 5 + .../generateKey/successes_Ed25519.https.any.js.ini | 5 + .../generateKey/successes_Ed448.https.any.js.ini | 5 + .../generateKey/successes_X25519.https.any.js.ini | 5 + .../generateKey/successes_X448.https.any.js.ini | 5 + .../meta/WebCryptoAPI/getRandomValues.any.js.ini | 38 + .../meta/WebCryptoAPI/idlharness.https.any.js.ini | 350 +++ .../import_export/ec_importKey.https.any.js.ini | 650 +++++ .../import_export/okp_importKey.https.any.js.ini | 338 +++ ...okp_importKey_failures_Ed25519.https.any.js.ini | 1466 ++++++++++ .../okp_importKey_failures_Ed448.https.any.js.ini | 1478 ++++++++++ .../okp_importKey_failures_X25519.https.any.js.ini | 1274 +++++++++ .../okp_importKey_failures_X448.https.any.js.ini | 1298 +++++++++ .../import_export/rsa_importKey.https.any.js.ini | 2882 ++++++++++++++++++++ .../symmetric_importKey.https.any.js.ini | 1406 ++++++++++ .../meta/WebCryptoAPI/randomUUID.https.any.js.ini | 20 + .../sign_verify/ecdsa.https.any.js.ini | 5 + .../sign_verify/eddsa.https.any.js.ini | 5 + .../WebCryptoAPI/sign_verify/hmac.https.any.js.ini | 5 + .../sign_verify/rsa_pkcs.https.any.js.ini | 5 + .../sign_verify/rsa_pss.https.any.js.ini | 5 + .../wrapKey_unwrapKey.https.any.js.ini | 8 + 33 files changed, 11975 insertions(+) create mode 100644 tests/wpt/meta/WebCryptoAPI/algorithm-discards-context.https.window.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/digest/digest.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/getRandomValues.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/idlharness.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/randomUUID.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini create mode 100644 tests/wpt/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini (limited to 'tests/wpt/meta/WebCryptoAPI') diff --git a/tests/wpt/meta/WebCryptoAPI/algorithm-discards-context.https.window.js.ini b/tests/wpt/meta/WebCryptoAPI/algorithm-discards-context.https.window.js.ini new file mode 100644 index 00000000000..4ccec835880 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/algorithm-discards-context.https.window.js.ini @@ -0,0 +1,40 @@ +[algorithm-discards-context.https.window.html] + expected: TIMEOUT + [Context is discarded in generateKey] + expected: TIMEOUT + + [Context is discarded in importKey] + expected: TIMEOUT + + [Context is discarded in encrypt] + expected: TIMEOUT + + [Context is discarded in decrypt] + expected: TIMEOUT + + [Context is discarded in digest] + expected: TIMEOUT + + [Context is discarded in sign] + expected: TIMEOUT + + [Context is discarded in verify] + expected: TIMEOUT + + [Context is discarded in deriveBits] + expected: TIMEOUT + + [Context is discarded in deriveKey] + expected: TIMEOUT + + [Context is discarded in deriveKey (2)] + expected: TIMEOUT + + [Context is discarded in wrapKey] + expected: TIMEOUT + + [Context is discarded in unwrapKey] + expected: TIMEOUT + + [Context is discarded in unwrapKey (2)] + expected: TIMEOUT diff --git a/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini new file mode 100644 index 00000000000..5e414c7aa15 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini @@ -0,0 +1,74 @@ +[cfrg_curves_bits.https.any.html] + [setup - define tests] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + +[cfrg_curves_bits.https.any.worker.html] + [setup - define tests] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini new file mode 100644 index 00000000000..68fe4aef6c2 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini @@ -0,0 +1,86 @@ +[cfrg_curves_keys.https.any.worker.html] + [setup - define tests] + expected: FAIL + + [Key derivation using a X25519 generated keys.] + expected: FAIL + + [Key derivation using a X448 generated keys.] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + +[cfrg_curves_keys.https.any.html] + [setup - define tests] + expected: FAIL + + [Key derivation using a X25519 generated keys.] + expected: FAIL + + [Key derivation using a X448 generated keys.] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/digest/digest.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/digest/digest.https.any.js.ini new file mode 100644 index 00000000000..15e0258b42b --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/digest/digest.https.any.js.ini @@ -0,0 +1,482 @@ +[digest.https.any.worker.html] + [SHA-1 with empty source data] + expected: FAIL + + [sha-1 with empty source data] + expected: FAIL + + [Sha-1 with empty source data] + expected: FAIL + + [SHA-1 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-256 with empty source data] + expected: FAIL + + [sha-256 with empty source data] + expected: FAIL + + [Sha-256 with empty source data] + expected: FAIL + + [SHA-256 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-384 with empty source data] + expected: FAIL + + [sha-384 with empty source data] + expected: FAIL + + [Sha-384 with empty source data] + expected: FAIL + + [SHA-384 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-512 with empty source data] + expected: FAIL + + [sha-512 with empty source data] + expected: FAIL + + [Sha-512 with empty source data] + expected: FAIL + + [SHA-512 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-1 with short source data] + expected: FAIL + + [sha-1 with short source data] + expected: FAIL + + [Sha-1 with short source data] + expected: FAIL + + [SHA-1 with short source data and altered buffer after call] + expected: FAIL + + [SHA-256 with short source data] + expected: FAIL + + [sha-256 with short source data] + expected: FAIL + + [Sha-256 with short source data] + expected: FAIL + + [SHA-256 with short source data and altered buffer after call] + expected: FAIL + + [SHA-384 with short source data] + expected: FAIL + + [sha-384 with short source data] + expected: FAIL + + [Sha-384 with short source data] + expected: FAIL + + [SHA-384 with short source data and altered buffer after call] + expected: FAIL + + [SHA-512 with short source data] + expected: FAIL + + [sha-512 with short source data] + expected: FAIL + + [Sha-512 with short source data] + expected: FAIL + + [SHA-512 with short source data and altered buffer after call] + expected: FAIL + + [SHA-1 with medium source data] + expected: FAIL + + [sha-1 with medium source data] + expected: FAIL + + [Sha-1 with medium source data] + expected: FAIL + + [SHA-1 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-256 with medium source data] + expected: FAIL + + [sha-256 with medium source data] + expected: FAIL + + [Sha-256 with medium source data] + expected: FAIL + + [SHA-256 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-384 with medium source data] + expected: FAIL + + [sha-384 with medium source data] + expected: FAIL + + [Sha-384 with medium source data] + expected: FAIL + + [SHA-384 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-512 with medium source data] + expected: FAIL + + [sha-512 with medium source data] + expected: FAIL + + [Sha-512 with medium source data] + expected: FAIL + + [SHA-512 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-1 with long source data] + expected: FAIL + + [sha-1 with long source data] + expected: FAIL + + [Sha-1 with long source data] + expected: FAIL + + [SHA-1 with long source data and altered buffer after call] + expected: FAIL + + [SHA-256 with long source data] + expected: FAIL + + [sha-256 with long source data] + expected: FAIL + + [Sha-256 with long source data] + expected: FAIL + + [SHA-256 with long source data and altered buffer after call] + expected: FAIL + + [SHA-384 with long source data] + expected: FAIL + + [sha-384 with long source data] + expected: FAIL + + [Sha-384 with long source data] + expected: FAIL + + [SHA-384 with long source data and altered buffer after call] + expected: FAIL + + [SHA-512 with long source data] + expected: FAIL + + [sha-512 with long source data] + expected: FAIL + + [Sha-512 with long source data] + expected: FAIL + + [SHA-512 with long source data and altered buffer after call] + expected: FAIL + + [AES-GCM with empty] + expected: FAIL + + [RSA-OAEP with empty] + expected: FAIL + + [PBKDF2 with empty] + expected: FAIL + + [AES-KW with empty] + expected: FAIL + + [AES-GCM with short] + expected: FAIL + + [RSA-OAEP with short] + expected: FAIL + + [PBKDF2 with short] + expected: FAIL + + [AES-KW with short] + expected: FAIL + + [AES-GCM with medium] + expected: FAIL + + [RSA-OAEP with medium] + expected: FAIL + + [PBKDF2 with medium] + expected: FAIL + + [AES-KW with medium] + expected: FAIL + + [AES-GCM with long] + expected: FAIL + + [RSA-OAEP with long] + expected: FAIL + + [PBKDF2 with long] + expected: FAIL + + [AES-KW with long] + expected: FAIL + + +[digest.https.any.html] + [SHA-1 with empty source data] + expected: FAIL + + [sha-1 with empty source data] + expected: FAIL + + [Sha-1 with empty source data] + expected: FAIL + + [SHA-1 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-256 with empty source data] + expected: FAIL + + [sha-256 with empty source data] + expected: FAIL + + [Sha-256 with empty source data] + expected: FAIL + + [SHA-256 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-384 with empty source data] + expected: FAIL + + [sha-384 with empty source data] + expected: FAIL + + [Sha-384 with empty source data] + expected: FAIL + + [SHA-384 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-512 with empty source data] + expected: FAIL + + [sha-512 with empty source data] + expected: FAIL + + [Sha-512 with empty source data] + expected: FAIL + + [SHA-512 with empty source data and altered buffer after call] + expected: FAIL + + [SHA-1 with short source data] + expected: FAIL + + [sha-1 with short source data] + expected: FAIL + + [Sha-1 with short source data] + expected: FAIL + + [SHA-1 with short source data and altered buffer after call] + expected: FAIL + + [SHA-256 with short source data] + expected: FAIL + + [sha-256 with short source data] + expected: FAIL + + [Sha-256 with short source data] + expected: FAIL + + [SHA-256 with short source data and altered buffer after call] + expected: FAIL + + [SHA-384 with short source data] + expected: FAIL + + [sha-384 with short source data] + expected: FAIL + + [Sha-384 with short source data] + expected: FAIL + + [SHA-384 with short source data and altered buffer after call] + expected: FAIL + + [SHA-512 with short source data] + expected: FAIL + + [sha-512 with short source data] + expected: FAIL + + [Sha-512 with short source data] + expected: FAIL + + [SHA-512 with short source data and altered buffer after call] + expected: FAIL + + [SHA-1 with medium source data] + expected: FAIL + + [sha-1 with medium source data] + expected: FAIL + + [Sha-1 with medium source data] + expected: FAIL + + [SHA-1 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-256 with medium source data] + expected: FAIL + + [sha-256 with medium source data] + expected: FAIL + + [Sha-256 with medium source data] + expected: FAIL + + [SHA-256 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-384 with medium source data] + expected: FAIL + + [sha-384 with medium source data] + expected: FAIL + + [Sha-384 with medium source data] + expected: FAIL + + [SHA-384 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-512 with medium source data] + expected: FAIL + + [sha-512 with medium source data] + expected: FAIL + + [Sha-512 with medium source data] + expected: FAIL + + [SHA-512 with medium source data and altered buffer after call] + expected: FAIL + + [SHA-1 with long source data] + expected: FAIL + + [sha-1 with long source data] + expected: FAIL + + [Sha-1 with long source data] + expected: FAIL + + [SHA-1 with long source data and altered buffer after call] + expected: FAIL + + [SHA-256 with long source data] + expected: FAIL + + [sha-256 with long source data] + expected: FAIL + + [Sha-256 with long source data] + expected: FAIL + + [SHA-256 with long source data and altered buffer after call] + expected: FAIL + + [SHA-384 with long source data] + expected: FAIL + + [sha-384 with long source data] + expected: FAIL + + [Sha-384 with long source data] + expected: FAIL + + [SHA-384 with long source data and altered buffer after call] + expected: FAIL + + [SHA-512 with long source data] + expected: FAIL + + [sha-512 with long source data] + expected: FAIL + + [Sha-512 with long source data] + expected: FAIL + + [SHA-512 with long source data and altered buffer after call] + expected: FAIL + + [AES-GCM with empty] + expected: FAIL + + [RSA-OAEP with empty] + expected: FAIL + + [PBKDF2 with empty] + expected: FAIL + + [AES-KW with empty] + expected: FAIL + + [AES-GCM with short] + expected: FAIL + + [RSA-OAEP with short] + expected: FAIL + + [PBKDF2 with short] + expected: FAIL + + [AES-KW with short] + expected: FAIL + + [AES-GCM with medium] + expected: FAIL + + [RSA-OAEP with medium] + expected: FAIL + + [PBKDF2 with medium] + expected: FAIL + + [AES-KW with medium] + expected: FAIL + + [AES-GCM with long] + expected: FAIL + + [RSA-OAEP with long] + expected: FAIL + + [PBKDF2 with long] + expected: FAIL + + [AES-KW with long] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.any.js.ini new file mode 100644 index 00000000000..cbfc68d6e2c --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.https.any.js.ini @@ -0,0 +1,5 @@ +[aes_cbc.https.any.worker.html] + expected: ERROR + +[aes_cbc.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini new file mode 100644 index 00000000000..d2996a9d397 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini @@ -0,0 +1,5 @@ +[aes_ctr.https.any.html] + expected: ERROR + +[aes_ctr.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini new file mode 100644 index 00000000000..6c734ffc220 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini @@ -0,0 +1,5 @@ +[aes_gcm.https.any.html] + expected: ERROR + +[aes_gcm.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini new file mode 100644 index 00000000000..79d732ad550 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini @@ -0,0 +1,5 @@ +[rsa_oaep.https.any.worker.html] + expected: ERROR + +[rsa_oaep.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini new file mode 100644 index 00000000000..847a6c7b0c7 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini @@ -0,0 +1,5 @@ +[failures_Ed25519.https.any.html] + expected: ERROR + +[failures_Ed25519.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini new file mode 100644 index 00000000000..35b3b54b63b --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini @@ -0,0 +1,5 @@ +[failures_Ed448.https.any.html] + expected: ERROR + +[failures_Ed448.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini new file mode 100644 index 00000000000..1aab3be20f5 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini @@ -0,0 +1,5 @@ +[failures_X25519.https.any.worker.html] + expected: ERROR + +[failures_X25519.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini new file mode 100644 index 00000000000..d66c97842c1 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini @@ -0,0 +1,5 @@ +[failures_X448.https.any.html] + expected: ERROR + +[failures_X448.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini new file mode 100644 index 00000000000..15e6068f18c --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini @@ -0,0 +1,5 @@ +[successes_Ed25519.https.any.worker.html] + expected: ERROR + +[successes_Ed25519.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini new file mode 100644 index 00000000000..fc3c91bded3 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini @@ -0,0 +1,5 @@ +[successes_Ed448.https.any.worker.html] + expected: ERROR + +[successes_Ed448.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini new file mode 100644 index 00000000000..4e49c46cff7 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini @@ -0,0 +1,5 @@ +[successes_X25519.https.any.html] + expected: ERROR + +[successes_X25519.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini new file mode 100644 index 00000000000..b3f5f031a6e --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini @@ -0,0 +1,5 @@ +[successes_X448.https.any.html] + expected: ERROR + +[successes_X448.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/getRandomValues.any.js.ini b/tests/wpt/meta/WebCryptoAPI/getRandomValues.any.js.ini new file mode 100644 index 00000000000..1082d3d1335 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/getRandomValues.any.js.ini @@ -0,0 +1,38 @@ +[getRandomValues.any.worker.html] + [Integer array: BigInt64Array] + expected: FAIL + + [Large length: BigInt64Array] + expected: FAIL + + [Null arrays: BigInt64Array] + expected: FAIL + + [Integer array: BigUint64Array] + expected: FAIL + + [Large length: BigUint64Array] + expected: FAIL + + [Null arrays: BigUint64Array] + expected: FAIL + + +[getRandomValues.any.html] + [Integer array: BigInt64Array] + expected: FAIL + + [Large length: BigInt64Array] + expected: FAIL + + [Null arrays: BigInt64Array] + expected: FAIL + + [Integer array: BigUint64Array] + expected: FAIL + + [Large length: BigUint64Array] + expected: FAIL + + [Null arrays: BigUint64Array] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/idlharness.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/idlharness.https.any.js.ini new file mode 100644 index 00000000000..5c493662c66 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/idlharness.https.any.js.ini @@ -0,0 +1,350 @@ +[idlharness.https.any.worker.html] + [Crypto interface: attribute subtle] + expected: FAIL + + [Crypto interface: operation randomUUID()] + expected: FAIL + + [Crypto interface: crypto must inherit property "subtle" with the proper type] + expected: FAIL + + [Crypto interface: crypto must inherit property "randomUUID()" with the proper type] + expected: FAIL + + [CryptoKey interface: existence and properties of interface object] + expected: FAIL + + [CryptoKey interface object length] + expected: FAIL + + [CryptoKey interface object name] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's @@unscopables property] + expected: FAIL + + [CryptoKey interface: attribute type] + expected: FAIL + + [CryptoKey interface: attribute extractable] + expected: FAIL + + [CryptoKey interface: attribute algorithm] + expected: FAIL + + [CryptoKey interface: attribute usages] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface object] + expected: FAIL + + [SubtleCrypto interface object length] + expected: FAIL + + [SubtleCrypto interface object name] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property] + expected: FAIL + + [SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)] + expected: FAIL + + [SubtleCrypto interface: operation importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)] + expected: FAIL + + [SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)] + expected: FAIL + + [SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto must be primary interface of crypto.subtle] + expected: FAIL + + [Stringification of crypto.subtle] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "sign(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "digest(AlgorithmIdentifier, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + +[idlharness.https.any.html] + [Crypto interface: attribute subtle] + expected: FAIL + + [Crypto interface: operation randomUUID()] + expected: FAIL + + [Crypto interface: crypto must inherit property "subtle" with the proper type] + expected: FAIL + + [Crypto interface: crypto must inherit property "randomUUID()" with the proper type] + expected: FAIL + + [CryptoKey interface: existence and properties of interface object] + expected: FAIL + + [CryptoKey interface object length] + expected: FAIL + + [CryptoKey interface object name] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's @@unscopables property] + expected: FAIL + + [CryptoKey interface: attribute type] + expected: FAIL + + [CryptoKey interface: attribute extractable] + expected: FAIL + + [CryptoKey interface: attribute algorithm] + expected: FAIL + + [CryptoKey interface: attribute usages] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface object] + expected: FAIL + + [SubtleCrypto interface object length] + expected: FAIL + + [SubtleCrypto interface object name] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property] + expected: FAIL + + [SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)] + expected: FAIL + + [SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)] + expected: FAIL + + [SubtleCrypto interface: operation importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)] + expected: FAIL + + [SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)] + expected: FAIL + + [SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence)] + expected: FAIL + + [SubtleCrypto must be primary interface of crypto.subtle] + expected: FAIL + + [Stringification of crypto.subtle] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling encrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "decrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling decrypt(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "sign(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "digest(AlgorithmIdentifier, BufferSource)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier, CryptoKey, unsigned long) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL + + [SubtleCrypto interface: crypto.subtle must inherit property "unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence)" with the proper type] + expected: FAIL + + [SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence) on crypto.subtle with too few arguments must throw TypeError] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini new file mode 100644 index 00000000000..20fd3d91938 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini @@ -0,0 +1,650 @@ +[ec_importKey.https.any.html] + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + +[ec_importKey.https.any.worker.html] + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(65), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(97), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(133), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini new file mode 100644 index 00000000000..bec3fcf8d84 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini @@ -0,0 +1,338 @@ +[okp_importKey.https.any.worker.html] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL + + +[okp_importKey.https.any.html] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini new file mode 100644 index 00000000000..c1b505a94d6 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini @@ -0,0 +1,1466 @@ +[okp_importKey_failures_Ed25519.https.any.worker.html] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + +[okp_importKey_failures_Ed25519.https.any.html] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini new file mode 100644 index 00000000000..9b794a6f26d --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini @@ -0,0 +1,1478 @@ +[okp_importKey_failures_Ed448.https.any.worker.html] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + +[okp_importKey_failures_Ed448.https.any.html] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini new file mode 100644 index 00000000000..88d88b1f4aa --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini @@ -0,0 +1,1274 @@ +[okp_importKey_failures_X25519.https.any.worker.html] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_X25519.https.any.html] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, false, [\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini new file mode 100644 index 00000000000..2ea911c02b9 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini @@ -0,0 +1,1298 @@ +[okp_importKey_failures_X448.https.any.html] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_X448.https.any.worker.html] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk (public) , {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, false, [\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini new file mode 100644 index 00000000000..42984c95cd0 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini @@ -0,0 +1,2882 @@ +[rsa_importKey.https.any.html] + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + +[rsa_importKey.https.any.worker.html] + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey, encrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-OAEP}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey, decrypt\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-OAEP}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSA-PSS}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSA-PSS}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (spki, buffer(162), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 1024 bits (pkcs8, buffer(636), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 1024 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (spki, buffer(294), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 2048 bits (pkcs8, buffer(1218), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 2048 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (spki, buffer(550), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [verify\])] + expected: FAIL + + [Good parameters: 4096 bits (pkcs8, buffer(2376), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL + + [Good parameters: 4096 bits (jwk, object(kty, n, e, d, p, q, dp, dq, qi), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [sign\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini new file mode 100644 index 00000000000..dd161ca37ec --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini @@ -0,0 +1,1406 @@ +[symmetric_importKey.https.any.html] + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + +[symmetric_importKey.https.any.worker.html] + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/randomUUID.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/randomUUID.https.any.js.ini new file mode 100644 index 00000000000..7c174d7a19e --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/randomUUID.https.any.js.ini @@ -0,0 +1,20 @@ +[randomUUID.https.any.html] + [namespace format] + expected: FAIL + + [version set] + expected: FAIL + + [variant set] + expected: FAIL + + +[randomUUID.https.any.worker.html] + [namespace format] + expected: FAIL + + [version set] + expected: FAIL + + [variant set] + expected: FAIL diff --git a/tests/wpt/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini new file mode 100644 index 00000000000..04f0fee484a --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini @@ -0,0 +1,5 @@ +[ecdsa.https.any.worker.html] + expected: ERROR + +[ecdsa.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini new file mode 100644 index 00000000000..878a7c3f74a --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini @@ -0,0 +1,5 @@ +[eddsa.https.any.html] + expected: ERROR + +[eddsa.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini new file mode 100644 index 00000000000..e0afc6fa603 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini @@ -0,0 +1,5 @@ +[hmac.https.any.html] + expected: ERROR + +[hmac.https.any.worker.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini new file mode 100644 index 00000000000..b4ac937cc13 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini @@ -0,0 +1,5 @@ +[rsa_pkcs.https.any.worker.html] + expected: ERROR + +[rsa_pkcs.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini new file mode 100644 index 00000000000..13d4842277b --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini @@ -0,0 +1,5 @@ +[rsa_pss.https.any.worker.html] + expected: ERROR + +[rsa_pss.https.any.html] + expected: ERROR diff --git a/tests/wpt/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini b/tests/wpt/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini new file mode 100644 index 00000000000..8e72bc8e245 --- /dev/null +++ b/tests/wpt/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini @@ -0,0 +1,8 @@ +[wrapKey_unwrapKey.https.any.html] + [setup] + expected: FAIL + + +[wrapKey_unwrapKey.https.any.worker.html] + [setup] + expected: FAIL -- cgit v1.2.3