mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-08-09 09:39:39 +00:00
Tests: Import WPT tests for X448 curves
This commit is contained in:
parent
aa33acf3a2
commit
a7652d5073
Notes:
github-actions[bot]
2024-11-25 16:18:12 +00:00
Author: https://github.com/awesomekling
Commit: a7652d5073
Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/2573
17 changed files with 1182 additions and 0 deletions
|
@ -0,0 +1,29 @@
|
|||
Summary
|
||||
|
||||
Harness status: Error
|
||||
|
||||
Rerun
|
||||
|
||||
Found 18 tests
|
||||
|
||||
1 Pass
|
||||
17 Fail
|
||||
Details
|
||||
Result Test Name MessagePass setup - define tests
|
||||
Fail X448 key derivation checks for all-zero value result with a key of order 0
|
||||
Fail X448 key derivation checks for all-zero value result with a key of order 1
|
||||
Fail X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)
|
||||
Fail X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)
|
||||
Fail X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)
|
||||
Fail X448 good parameters
|
||||
Fail X448 mixed case parameters
|
||||
Fail X448 short result
|
||||
Fail X448 non-multiple of 8 bits
|
||||
Fail X448 missing public property
|
||||
Fail X448 public property of algorithm is not a CryptoKey
|
||||
Fail X448 mismatched algorithms
|
||||
Fail X448 no deriveBits usage for base key
|
||||
Fail X448 base key is not a private key
|
||||
Fail X448 public property value is a private key
|
||||
Fail X448 public property value is a secret key
|
||||
Fail X448 asking for too many bits
|
|
@ -0,0 +1,403 @@
|
|||
Summary
|
||||
|
||||
Harness status: OK
|
||||
|
||||
Rerun
|
||||
|
||||
Found 392 tests
|
||||
|
||||
332 Pass
|
||||
60 Fail
|
||||
Details
|
||||
Result Test Name MessagePass Bad algorithm: generateKey(AES, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey(AES, false, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey(AES, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, false, [])
|
||||
Pass Bad algorithm: generateKey(AES, true, [])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [])
|
||||
Pass Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, decrypt])
|
||||
Pass Empty algorithm: generateKey({}, false, [sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits, sign])
|
||||
Pass Empty algorithm: generateKey({}, false, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, false, [])
|
||||
Pass Empty algorithm: generateKey({}, true, [])
|
||||
Pass Empty algorithm: generateKey({}, RED, [])
|
||||
Pass Empty algorithm: generateKey({}, 7, [])
|
||||
Pass Empty algorithm: generateKey({}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Pass Empty algorithm: generateKey({}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [encrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [decrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [sign])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, sign])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, sign])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [verify])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, verify])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, verify])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey])
|
||||
Fail Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
||||
Fail Empty usages: generateKey({name: X448}, false, [])
|
||||
Fail Empty usages: generateKey({name: X448}, true, [])
|
|
@ -0,0 +1,26 @@
|
|||
Summary
|
||||
|
||||
Harness status: OK
|
||||
|
||||
Rerun
|
||||
|
||||
Found 16 tests
|
||||
|
||||
16 Fail
|
||||
Details
|
||||
Result Test Name MessageFail Success: generateKey({name: X448}, false, [deriveKey])
|
||||
Fail Success: generateKey({name: X448}, true, [deriveKey])
|
||||
Fail Success: generateKey({name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Success: generateKey({name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Success: generateKey({name: X448}, false, [deriveBits])
|
||||
Fail Success: generateKey({name: X448}, true, [deriveBits])
|
||||
Fail Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Success: generateKey({name: x448}, false, [deriveKey])
|
||||
Fail Success: generateKey({name: x448}, true, [deriveKey])
|
||||
Fail Success: generateKey({name: x448}, false, [deriveBits, deriveKey])
|
||||
Fail Success: generateKey({name: x448}, true, [deriveBits, deriveKey])
|
||||
Fail Success: generateKey({name: x448}, false, [deriveBits])
|
||||
Fail Success: generateKey({name: x448}, true, [deriveBits])
|
||||
Fail Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])
|
|
@ -0,0 +1,64 @@
|
|||
Summary
|
||||
|
||||
Harness status: OK
|
||||
|
||||
Rerun
|
||||
|
||||
Found 54 tests
|
||||
|
||||
54 Fail
|
||||
Details
|
||||
Result Test Name MessageFail Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [])
|
||||
Fail Good parameters: X448 bits (spki, buffer(68), X448, true, [])
|
||||
Fail Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [])
|
||||
Fail Good parameters: X448 bits (jwk, object(kty, crv, x), X448, true, [])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), {name: X448}, true, [])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), X448, true, [])
|
||||
Fail Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [])
|
||||
Fail Good parameters: X448 bits (raw, buffer(56), X448, true, [])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [])
|
||||
Fail Good parameters: X448 bits (spki, buffer(68), X448, false, [])
|
||||
Fail Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [])
|
||||
Fail Good parameters: X448 bits (jwk, object(kty, crv, x), X448, false, [])
|
||||
Fail Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [])
|
||||
Fail Good parameters: X448 bits (raw, buffer(56), X448, false, [])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits, deriveKey])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
|
@ -0,0 +1,235 @@
|
|||
Summary
|
||||
|
||||
Harness status: OK
|
||||
|
||||
Rerun
|
||||
|
||||
Found 224 tests
|
||||
|
||||
8 Pass
|
||||
216 Fail
|
||||
Details
|
||||
Result Test Name MessageFail Bad usages: importKey(spki, {name: X448}, true, [encrypt])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [encrypt])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [decrypt])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [decrypt])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [sign])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [sign])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [verify])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [verify])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [wrapKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [unwrapKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [deriveKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [deriveKey])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, true, [deriveBits])
|
||||
Fail Bad usages: importKey(spki, {name: X448}, false, [deriveBits])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [encrypt])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [encrypt])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [decrypt])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [decrypt])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [sign])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [sign])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [verify])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [verify])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [wrapKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [unwrapKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [deriveKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [deriveKey])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, true, [deriveBits])
|
||||
Fail Bad usages: importKey(raw, {name: X448}, false, [deriveBits])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [sign])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [sign])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [verify])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [verify])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits])
|
||||
Fail Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits])
|
||||
Fail Empty usages: importKey(pkcs8, {name: X448}, true, [])
|
||||
Fail Empty usages: importKey(pkcs8, {name: X448}, false, [])
|
||||
Fail Empty usages: importKey(jwk(private), {name: X448}, true, [])
|
||||
Fail Empty usages: importKey(jwk(private), {name: X448}, false, [])
|
||||
Fail Bad key length: importKey(spki, {name: X448}, true, [])
|
||||
Fail Bad key length: importKey(spki, {name: X448}, false, [])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Bad key length: importKey(raw, {name: X448}, true, [])
|
||||
Fail Bad key length: importKey(raw, {name: X448}, false, [])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Bad key length: importKey(jwk (public) , {name: X448}, true, [])
|
||||
Fail Bad key length: importKey(jwk (public) , {name: X448}, false, [])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Fail Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [])
|
||||
Fail Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [])
|
||||
Fail Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey])
|
||||
Fail Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey])
|
||||
Fail Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits])
|
||||
Fail Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits])
|
||||
Pass Missing algorithm name: importKey(pkcs8, {}, true, deriveKey)
|
||||
Pass Missing algorithm name: importKey(pkcs8, {}, false, deriveKey)
|
||||
Pass Missing algorithm name: importKey(pkcs8, {}, true, deriveBits)
|
||||
Pass Missing algorithm name: importKey(pkcs8, {}, false, deriveBits)
|
||||
Pass Missing algorithm name: importKey(jwk(private), {}, true, deriveKey)
|
||||
Pass Missing algorithm name: importKey(jwk(private), {}, false, deriveKey)
|
||||
Pass Missing algorithm name: importKey(jwk(private), {}, true, deriveBits)
|
||||
Pass Missing algorithm name: importKey(jwk(private), {}, false, deriveBits)
|
Loading…
Add table
Add a link
Reference in a new issue